text
stringlengths 14
5.22M
| meta
dict | __index_level_0__
int64 0
9.97k
| input_ids
sequencelengths 128
128
| attention_mask
sequencelengths 128
128
| labels
sequencelengths 128
128
|
---|---|---|---|---|---|
This site contains the latest updates of the Capacity Planning Tool and summary of vendor published SPEC hardware platform benchmarks. You need Microsoft® Office® 2010 or higher to use the Capacity Planning Tool (Excel® 2016 is the current CPT development platform).
It is recommended that users complete the System Architecture Design Strategies training before using the Capacity Planning tool.
The February CPT release allows you to use the SPECint_rate2017 throughput baseline values for platform relative performance benchmarks.
The Arc19CapacityPlanning0201 release includes the following updates.
Includes new Arc19 performance baseline (7.4 = Arc18 baseline/10) for SPECint_rate2017 benchmark value.
All hardware platform relative throughput values are converted to SPECint_rate2017 baseline.
Arc19CapacityPlanning0201 was development using Microsoft® Excel® 2016 platform, maintaining functional capability with Office 2010 and 2013.
Hardware vendor platform performance updates are published on SPEC.
HardwareSPEC17 workbook translates all older platform SPECint_rate2006 platform benchmarks to equivalent SPECint_rate2017 benchmark values.
The September CPT release allows you to configure virtual hardware solutions without having to link the virtual platform tier to the host platform tier. Virtual tier are automatically linked to the assigned host platform.
The Arc18CapacityPlanning0901 release includes the following updates.
Virtual server configurations automatically use host platform selection.
Arc18CapacityPlanning0901 was development using Microsoft® Excel® 2016 platform, maintaining functional capability with Office 2010 and 2013.
The HardwareSPEC workbook includes a download of published SPEC vendor benchmarks and Amazon EC2 virtual machines (AMI) for your use in capacity planning.
Performance benchmark download date is identified on the workbook tab.
HardwareSPEC workbook includes SPECrate_int2006 and SPECrate_int2017 benchmarks.
The Arc18CapacityPlanning0701 release includes the following updates.
Arc18CapacityPlanning0701 CPT was development using Microsoft® Excel® 2016 platform, maintaining functional capability with Office 2010 and 2013.
Several CPT Demos included in the System Architecture Design Strategies (SADS) Web based training class are shared below. These videos demonstrate performance and scalability best practices shared throughout the System Design Strategies wiki chapters. The demos also share how to use the CPT for completing your system architecture design analysis.
The October 2017 Arc17CapacityPlanning1001 CPT introduced new Xeon Gold 2017 Intel platforms. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,686 | [
128000,
2028,
2816,
5727,
279,
5652,
9013,
315,
279,
41210,
28780,
13782,
323,
12399,
315,
21390,
4756,
48204,
12035,
5452,
63119,
13,
1472,
1205,
5210,
12175,
8410,
12175,
220,
679,
15,
477,
5190,
311,
1005,
279,
41210,
28780,
13782,
320,
20656,
12175,
220,
679,
21,
374,
279,
1510,
356,
2898,
4500,
5452,
4390,
2181,
374,
11349,
430,
3932,
4686,
279,
744,
38943,
7127,
56619,
4967,
1603,
1701,
279,
41210,
28780,
5507,
627,
791,
7552,
356,
2898,
4984,
6276,
499,
311,
1005,
279,
48204,
396,
9430,
679,
22,
64862,
26954,
2819,
369,
5452,
8844,
5178,
63119,
627,
791,
20267,
777,
30492,
84080,
11139,
16,
4984,
5764,
279,
2768,
9013,
627,
56934,
502,
20267,
777,
5178,
26954,
320,
22,
13,
19,
284,
20267,
972,
26954,
14,
605,
8,
369,
48204
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
2028,
2816,
5727,
279,
5652,
9013,
315,
279,
41210,
28780,
13782,
323,
12399,
315,
21390,
4756,
48204,
12035,
5452,
63119,
13,
1472,
1205,
5210,
12175,
8410,
12175,
220,
679,
15,
477,
5190,
311,
1005,
279,
41210,
28780,
13782,
320,
20656,
12175,
220,
679,
21,
374,
279,
1510,
356,
2898,
4500,
5452,
4390,
2181,
374,
11349,
430,
3932,
4686,
279,
744,
38943,
7127,
56619,
4967,
1603,
1701,
279,
41210,
28780,
5507,
627,
791,
7552,
356,
2898,
4984,
6276,
499,
311,
1005,
279,
48204,
396,
9430,
679,
22,
64862,
26954,
2819,
369,
5452,
8844,
5178,
63119,
627,
791,
20267,
777,
30492,
84080,
11139,
16,
4984,
5764,
279,
2768,
9013,
627,
56934,
502,
20267,
777,
5178,
26954,
320,
22,
13,
19,
284,
20267,
972,
26954,
14,
605,
8,
369,
48204,
-100
] |
I've recently produced some demo recordings for a friend interested in applying for performance roles in musical theatre.
She has a connection with Mirvish Productions, so having some high quality recordings should provide an essential piece in her pursuit of theatrical stardom. Here are some clips from the session, recorded and produced by HSA. | {
"redpajama_set_name": "RedPajamaC4"
} | 1,575 | [
128000,
40,
3077,
6051,
9124,
1063,
17074,
38140,
369,
264,
4333,
8173,
304,
19486,
369,
5178,
13073,
304,
18273,
34596,
627,
8100,
706,
264,
3717,
449,
14603,
85,
819,
52964,
11,
779,
3515,
1063,
1579,
4367,
38140,
1288,
3493,
459,
7718,
6710,
304,
1077,
33436,
315,
66333,
357,
569,
316,
13,
5810,
527,
1063,
27203,
505,
279,
3882,
11,
12715,
323,
9124,
555,
473,
7934,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
40,
3077,
6051,
9124,
1063,
17074,
38140,
369,
264,
4333,
8173,
304,
19486,
369,
5178,
13073,
304,
18273,
34596,
627,
8100,
706,
264,
3717,
449,
14603,
85,
819,
52964,
11,
779,
3515,
1063,
1579,
4367,
38140,
1288,
3493,
459,
7718,
6710,
304,
1077,
33436,
315,
66333,
357,
569,
316,
13,
5810,
527,
1063,
27203,
505,
279,
3882,
11,
12715,
323,
9124,
555,
473,
7934,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Q: Fire and event after the user is logged in for certain amount of time I know how to handle events and listeners in Laravel, but my question is, how to fire and event when a user is logged in for more than 90 minutes.
Is there a way to do it?
A: In Laravel 5.3 you can override login() method in LoginController.php and save timestamp of the moment when user logged in.
Then you could run Scheduler task each minute and get all users who logged in 90 minutes ago and fire event.
A: you need to create a job and delay it.
check this link for more information :
https://laravel.com/docs/5.3/queues#delayed-dispatching
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 483 | [
128000,
48,
25,
6785,
323,
1567,
1306,
279,
1217,
374,
14042,
304,
369,
3738,
3392,
315,
892,
358,
1440,
1268,
311,
3790,
4455,
323,
24475,
304,
65306,
11,
719,
856,
3488,
374,
11,
1268,
311,
4027,
323,
1567,
994,
264,
1217,
374,
14042,
304,
369,
810,
1109,
220,
1954,
4520,
13,
720,
3957,
1070,
264,
1648,
311,
656,
433,
1980,
32,
25,
763,
65306,
220,
20,
13,
18,
499,
649,
2882,
5982,
368,
1749,
304,
8955,
2095,
2348,
323,
3665,
11695,
315,
279,
4545,
994,
1217,
14042,
304,
627,
12487,
499,
1436,
1629,
45859,
3465,
1855,
9568,
323,
636,
682,
3932,
889,
14042,
304,
220,
1954,
4520,
4227,
323,
4027,
1567,
382,
32,
25,
499,
1205,
311,
1893,
264,
2683,
323,
7781,
433,
627,
2071,
420,
2723,
369
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48,
25,
6785,
323,
1567,
1306,
279,
1217,
374,
14042,
304,
369,
3738,
3392,
315,
892,
358,
1440,
1268,
311,
3790,
4455,
323,
24475,
304,
65306,
11,
719,
856,
3488,
374,
11,
1268,
311,
4027,
323,
1567,
994,
264,
1217,
374,
14042,
304,
369,
810,
1109,
220,
1954,
4520,
13,
720,
3957,
1070,
264,
1648,
311,
656,
433,
1980,
32,
25,
763,
65306,
220,
20,
13,
18,
499,
649,
2882,
5982,
368,
1749,
304,
8955,
2095,
2348,
323,
3665,
11695,
315,
279,
4545,
994,
1217,
14042,
304,
627,
12487,
499,
1436,
1629,
45859,
3465,
1855,
9568,
323,
636,
682,
3932,
889,
14042,
304,
220,
1954,
4520,
4227,
323,
4027,
1567,
382,
32,
25,
499,
1205,
311,
1893,
264,
2683,
323,
7781,
433,
627,
2071,
420,
2723,
369,
-100
] |
Variety Concerts
The Music Is Bond
Wed 8 May, 8:00pm – 10:20pm
Christchurch Town Hall, 86 Kilmore St, Christchurch
Note: Date has been changed to May 8.
All existing tickets are valid for the new date - If you require your tickets to be re-issued please contact Ticketek.
A stunning orchestral event.
The world of James Bond comes to life in this thrilling symphonic event celebrating over 50 years of 007 at the spectacular, newly opened Christchurch Town Hall, following its $152m restoration.
With a superb cast of hand-picked soloists and backed by the magnificent sound of the Christchurch Symphony Orchestra, 'The Music is Bond…' showcases the unforgettable songs and iconic music associated with the world's most famous spy. A must-see evening of music which transcends generations.
Bond themes have been performed by some of the greatest pop artists of their generation. From the unmistakable voice of the Shirley Bassey, and pop icons including Adele, Tom Jones, Paul McCartney, Tina Turner, Sheena Easton, Duran Duran and many more.
Beginning with the spectacular Bond Theme, the concert includes classics such as Skyfall, Goldfinger, Diamonds Are Forever, From Russia With Love, Live and Let Die, For Your Eyes Only, A View to a Kill, The Spy Who Loved Me and many more
Starring Jackie Clarke, Ali Harper, Fergus Inder and Caitlin Smith. Hosted and conducted by Tim Beveridge
Presented by: Coast in association with Aston Martin, Craigs Investment Partners and The George Christchurch.
Raw Comedy: Open Mic Night
Mon 22 Jul – more dates
Scared Scriptless: We're Not Joking About Europe
Rolleston College, Rolleston, Selwyn
Lamb & Hayward Masterworks: Requiem
Christchurch Town Hall, Christchurch
50% Happy / Half of What is Wrong With Me
Fri 6 Sep | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 3,879 | [
128000,
57235,
2676,
47784,
82,
198,
791,
10948,
2209,
24537,
198,
27601,
220,
23,
3297,
11,
220,
23,
25,
410,
5298,
1389,
220,
605,
25,
508,
5298,
198,
19875,
65294,
14298,
11166,
11,
220,
4218,
38988,
6518,
800,
11,
3771,
65294,
198,
9290,
25,
2696,
706,
1027,
5614,
311,
3297,
220,
23,
627,
2460,
6484,
14741,
527,
2764,
369,
279,
502,
2457,
482,
1442,
499,
1397,
701,
14741,
311,
387,
312,
12,
59326,
4587,
3729,
29497,
1247,
627,
32,
20441,
70984,
3545,
1567,
627,
791,
1917,
315,
7957,
24537,
4131,
311,
2324,
304,
420,
57399,
8045,
764,
14338,
1567,
32689,
927,
220,
1135,
1667,
315,
220,
11194,
520,
279,
28809,
11,
13945,
9107,
3771,
65294,
14298,
11166,
11,
2768,
1202,
400,
9756,
76,
35093,
627,
2409,
264,
33689
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
57235,
2676,
47784,
82,
198,
791,
10948,
2209,
24537,
198,
27601,
220,
23,
3297,
11,
220,
23,
25,
410,
5298,
1389,
220,
605,
25,
508,
5298,
198,
19875,
65294,
14298,
11166,
11,
220,
4218,
38988,
6518,
800,
11,
3771,
65294,
198,
9290,
25,
2696,
706,
1027,
5614,
311,
3297,
220,
23,
627,
2460,
6484,
14741,
527,
2764,
369,
279,
502,
2457,
482,
1442,
499,
1397,
701,
14741,
311,
387,
312,
12,
59326,
4587,
3729,
29497,
1247,
627,
32,
20441,
70984,
3545,
1567,
627,
791,
1917,
315,
7957,
24537,
4131,
311,
2324,
304,
420,
57399,
8045,
764,
14338,
1567,
32689,
927,
220,
1135,
1667,
315,
220,
11194,
520,
279,
28809,
11,
13945,
9107,
3771,
65294,
14298,
11166,
11,
2768,
1202,
400,
9756,
76,
35093,
627,
2409,
264,
33689,
-100
] |
Sao Paulo, Brazil (5 June): Lucas Park won a thrilling three-way playoff to claim an incredible victory at the Faldo Series South America Championship at São Fernando Golf Club in Brazil. Park battled with Thomas Choi and Giovanna Fernandez Lopez after the youngsters could not be split over 54 holes. Park was euphoric upon sealing his win and booking his place in the 22nd Faldo Series Grand Final.
"I'm very happy, I've never shouted so much in my life as when I holed the winning putt. I have trained a lot since I lost in the playoff last year and the result came out perfect this season", said Lucas Park after the win. "Now I will continue giving my maximum to play well in the Grand Final", he added. Park also commented on his last round with Paraguayan Giovanna: "She's only fifteen and plays very well, I was pleasantly surprised by her quality and the high technical level of the last round we played together".
The South America Championship proved a magnet for some of the continents brightest young golfing stars. 82 golfers hailing from six nations competed over three days, drawn by the prestige of the tournament and the tantalising prospect of qualifying for the Faldo Series Grand Final.
Park fired rounds of 74, 68 and 71 to end on 213 but he had company. Another Brazilian - Thomas Choi shot 75, 72 and a stunning 66 to finish on the same score. Paraguayan Giovanna Fernandez Lopez went round in fine style to card 71, 70 and 72. The three-way playoff for the overall classification also decided who of Park and Choi would claim the Boys' Under-18 division. In the playoff Lopez fell at the first extra hole and Park prevailed on the second against Choi with a birdie.
Park claimed the ultimate prize but there were four more Grand Final tickets available for the age category winners. The Boys' Under-21s was won by Filipe Rossi of Brazil who started brilliantly with a 68 and sealed the three-shot division win with a 74 and a 75. Rossi will now line up in his first Faldo Series Grand Final.
The Boys' Under-16s was decided by another high octane playoff with fine margins. Nicolas Cimadevilla of Equador faced off against Brazilain Guilherme Grinberg with a considerable crowd surrounding the hole - eager to see the action. On the first playoff hole both hit superb wedge shots with Grinberg just 10 feet from the pin - but 4 feet back from Cimadevilla's sublime effort. As Grinberg's effort slipped past by the edge of the hole the Ecuadorian kept his cool for the birdie putt and the win.
The Girls' Under-21 division was won in convincing fashion by Paraguay's Viviana Maria Prette. Prette fired 77, 71 and 77 to easily hold off her challengers and confirm qualification for the Grand Final alongside compatriot Giovanna Fernandez Lopez who played majestically to give herself a shot at overall victory. Although the young Paraguayan fell at the playoff she will be delighted with her three days. Her rounds of 71, 70 and 72 were too much for her fellow Under-16 players and she will go into her first Grand Final brimming with confidence.
Sir Nick Faldo's personal coach Keith Wood worked closely with the Brazilian National coaches and instructors from São Fernando Golf Club. All worked in tandem to provide support for the players throughout the week and provide pointers on all aspects of the game. The São Fernando Golf Club members were also treated to some world-class coaching.
The Brazilian Golf Confederation is devoted to grassroots golf and has thrown its support behind junior golf development. Once again the famed 'Mini Faldo Series' for Under-13's and 11's took place alongside the main tournament. Twenty children experienced the thrill of tournament golf and then were inspired to see the action unfolding in the Faldo Series proper. | {
"redpajama_set_name": "RedPajamaC4"
} | 7,864 | [
128000,
50,
3524,
38026,
11,
16327,
320,
20,
5651,
1680,
32103,
5657,
2834,
264,
57399,
2380,
27896,
19942,
311,
3802,
459,
15400,
12845,
520,
279,
23718,
3055,
11378,
4987,
5270,
19134,
520,
48790,
51485,
28131,
10349,
304,
16327,
13,
5657,
75440,
449,
11355,
87673,
323,
61678,
12930,
83726,
45315,
1306,
279,
61095,
1436,
539,
387,
6859,
927,
220,
4370,
20349,
13,
5657,
574,
65043,
20100,
292,
5304,
66934,
813,
3243,
323,
22615,
813,
2035,
304,
279,
220,
1313,
303,
23718,
3055,
11378,
10517,
13321,
627,
7189,
2846,
1633,
6380,
11,
358,
3077,
2646,
44543,
779,
1790,
304,
856,
2324,
439,
994,
358,
11640,
839,
279,
11230,
91434,
13,
358,
617,
16572,
264,
2763,
2533,
358,
5675,
304,
279,
19942,
1566,
1060,
323,
279,
1121,
3782,
704,
4832,
420
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
50,
3524,
38026,
11,
16327,
320,
20,
5651,
1680,
32103,
5657,
2834,
264,
57399,
2380,
27896,
19942,
311,
3802,
459,
15400,
12845,
520,
279,
23718,
3055,
11378,
4987,
5270,
19134,
520,
48790,
51485,
28131,
10349,
304,
16327,
13,
5657,
75440,
449,
11355,
87673,
323,
61678,
12930,
83726,
45315,
1306,
279,
61095,
1436,
539,
387,
6859,
927,
220,
4370,
20349,
13,
5657,
574,
65043,
20100,
292,
5304,
66934,
813,
3243,
323,
22615,
813,
2035,
304,
279,
220,
1313,
303,
23718,
3055,
11378,
10517,
13321,
627,
7189,
2846,
1633,
6380,
11,
358,
3077,
2646,
44543,
779,
1790,
304,
856,
2324,
439,
994,
358,
11640,
839,
279,
11230,
91434,
13,
358,
617,
16572,
264,
2763,
2533,
358,
5675,
304,
279,
19942,
1566,
1060,
323,
279,
1121,
3782,
704,
4832,
420,
-100
] |
(+64) 21 812 212
[email protected]
Viva en New Zealand / New Zealand
New Zealand is a wealthy Pacific nation predominantly made of people from European descent. The Maori, who were descendants of Polynesian settlers are the indigenous people of New Zealand, and make up the largest minority group in New Zealand.
New Zealand consists of two main islands and numerous smaller ones. Around three-quarters of the population lives in the North Island, which is also home to the capital, Wellington.
Agriculture is the economic mainstay, but manufacturing and tourism are important. Visitors are drawn to the glacier-carved mountains, lakes, beaches and thermal springs. Because of the island's geographical isolation, much of the flora and fauna is unique to the country.
New Zealand plays an active role in Pacific affairs. It has constitutional ties with the Pacific territories of Niue, the Cook Islands and Tokelau.
"New Zealand is a land of kindness, security, tranquility and well-being"
Maori were the first inhabitants of New Zealand, thought to have arrived around the early 14th Century. Maori oral history maintains that they came to the island in seven canoes from other parts of Polynesia. In 1642, New Zealand was explored by Abel Tasman, a Dutch navigator. British captain, James Cook made three voyages to the islands, beginning in 1769. Britain formally annexed the islands in 1840.
The Treaty of Waitangi, which took place on February 6, 1840, between the British and several Maori tribes promised to protect Maori land on the condition of them recognizing British rule. Encroachment by British settlers was relentless however, and conflict between the two groups intensified.
New Zealand is rated in international surveys as one of the world's most peaceful, least corrupt countries. The 2017 Global Peace Index, which compares 162 countries for the risk of personal violence, rates New Zealand as the world's second safest country after Iceland. Transparency International's 2017 Corruption Perception Index ranks New Zealand the least corrupt country in the world, equal with Denmark.
New Zealand does not even have any seriously dangerous wildlife for you to worry about. The most dangerous animal you might find is a Kea – Kea's are parrot-like birds found at higher altitudes in the South Island who sometimes display a taste for the rubber on windscreens, doors and mirrors of cars!
We are ready to start this amazing experience with you!
Carrera 11B N°99 - 25
Edificio WeWork Phone: (+57) 3124811070 E-Mail: [email protected] Web: vivaenz.com
10 Newton Rd. Grey Lynn
Auckland 1010 Phone: (+64) 21 812 212 E-Mail: [email protected] Web: vivaenz.com
© Copyright 2019 – Viva en New Zealand | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 3,006 | [
128000,
42038,
1227,
8,
220,
1691,
220,
19270,
220,
11227,
198,
2801,
31,
85,
10126,
268,
62082,
198,
53,
10126,
665,
1561,
17340,
611,
1561,
17340,
198,
3648,
17340,
374,
264,
28994,
16867,
7140,
47904,
1903,
315,
1274,
505,
7665,
38052,
13,
578,
11583,
13915,
11,
889,
1051,
49446,
315,
3735,
1910,
30321,
61107,
527,
279,
39678,
1274,
315,
1561,
17340,
11,
323,
1304,
709,
279,
7928,
23413,
1912,
304,
1561,
17340,
627,
3648,
17340,
17610,
315,
1403,
1925,
30100,
323,
12387,
9333,
6305,
13,
33916,
2380,
83641,
315,
279,
7187,
6439,
304,
279,
4892,
10951,
11,
902,
374,
1101,
2162,
311,
279,
6864,
11,
57104,
627,
32,
13130,
554,
374,
279,
7100,
1925,
60021,
11,
719,
15266,
323,
32083,
527,
3062,
13,
69940,
527,
15107,
311,
279
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
42038,
1227,
8,
220,
1691,
220,
19270,
220,
11227,
198,
2801,
31,
85,
10126,
268,
62082,
198,
53,
10126,
665,
1561,
17340,
611,
1561,
17340,
198,
3648,
17340,
374,
264,
28994,
16867,
7140,
47904,
1903,
315,
1274,
505,
7665,
38052,
13,
578,
11583,
13915,
11,
889,
1051,
49446,
315,
3735,
1910,
30321,
61107,
527,
279,
39678,
1274,
315,
1561,
17340,
11,
323,
1304,
709,
279,
7928,
23413,
1912,
304,
1561,
17340,
627,
3648,
17340,
17610,
315,
1403,
1925,
30100,
323,
12387,
9333,
6305,
13,
33916,
2380,
83641,
315,
279,
7187,
6439,
304,
279,
4892,
10951,
11,
902,
374,
1101,
2162,
311,
279,
6864,
11,
57104,
627,
32,
13130,
554,
374,
279,
7100,
1925,
60021,
11,
719,
15266,
323,
32083,
527,
3062,
13,
69940,
527,
15107,
311,
279,
-100
] |
Born in Scarborough, Ontario, Lawrence LaPianta has been cooking barbecue for over two decades, but exposure to world-class mentors like Pitmaster Mike Mills was all it took for Lawrence La Pianta to completely perfect the craft of traditional, wood-smoked BBQ. Since 2009, Lawrence has competed at the most prestigious BBQ contests in the world.
Lawrence helped open and create the BBQ menu at Riverside's AFT Bar – a neighbourhood comfort food spot which quickly became known for his weekend Texas smokehouse menu.
With 20 years of production location scouting experience, Lawrence took over the former 1910 Dominion Bank in the Portlands – turning it into his dream counter-service barbecue joint. Taking a regional approach, he describes it as "Toronto style barbecue" – with baby back ribs inspired by St. Louis, brisket inspired by Texas, and pulled pork inspired by North Carolina.
Today, Pitmaster Lawrence La Pianta competes and judges on some of the largest barbecue competitions alongside some of the world's best – including the Kansas City Barbeque Society. Excited to share his tender, slow-smoked meats with the downtown core, Lawrence recommends a light amount of sauce because the simple seasoning and smoky flavours are what truly let his tender meat shine. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,872 | [
128000,
59204,
304,
86532,
11,
21193,
11,
28574,
5034,
47,
5485,
64,
706,
1027,
17677,
62312,
369,
927,
1403,
11026,
11,
719,
14675,
311,
1917,
15144,
76707,
1093,
40079,
13943,
11519,
34202,
574,
682,
433,
3952,
369,
28574,
5034,
393,
5485,
64,
311,
6724,
4832,
279,
11003,
315,
8776,
11,
7732,
4773,
11059,
46377,
13,
8876,
220,
1049,
24,
11,
28574,
706,
67235,
520,
279,
1455,
41385,
46377,
47603,
304,
279,
1917,
627,
39166,
16271,
9087,
1825,
323,
1893,
279,
46377,
5130,
520,
63941,
596,
362,
4082,
4821,
1389,
264,
40442,
6981,
3691,
7858,
902,
6288,
6244,
3967,
369,
813,
9178,
8421,
16603,
7830,
5130,
627,
2409,
220,
508,
1667,
315,
5788,
3813,
67480,
3217,
11,
28574,
3952,
927,
279,
4846,
220,
7529,
15,
76521,
8715,
304,
279
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
59204,
304,
86532,
11,
21193,
11,
28574,
5034,
47,
5485,
64,
706,
1027,
17677,
62312,
369,
927,
1403,
11026,
11,
719,
14675,
311,
1917,
15144,
76707,
1093,
40079,
13943,
11519,
34202,
574,
682,
433,
3952,
369,
28574,
5034,
393,
5485,
64,
311,
6724,
4832,
279,
11003,
315,
8776,
11,
7732,
4773,
11059,
46377,
13,
8876,
220,
1049,
24,
11,
28574,
706,
67235,
520,
279,
1455,
41385,
46377,
47603,
304,
279,
1917,
627,
39166,
16271,
9087,
1825,
323,
1893,
279,
46377,
5130,
520,
63941,
596,
362,
4082,
4821,
1389,
264,
40442,
6981,
3691,
7858,
902,
6288,
6244,
3967,
369,
813,
9178,
8421,
16603,
7830,
5130,
627,
2409,
220,
508,
1667,
315,
5788,
3813,
67480,
3217,
11,
28574,
3952,
927,
279,
4846,
220,
7529,
15,
76521,
8715,
304,
279,
-100
] |
Droue-sur-Drouette est une commune française située dans le département d'Eure-et-Loir, en région Centre-Val de Loire.
Géographie
Situation
Le village est situé à à l'est d'Épernon.
Lieux-dits et écarts
Les Marmouzets, le Hameau, le Petit Droue, le Haut de la Folie.
Communes, département et région limitrophes
La commune est limitrophe du département des Yvelines, région Île-de-France (communes de Saint-Hilarion et d'Émancé).
Hydrographie
Le village est traversé de part et d'autre par la rivière la Droue, que l'on retrouve à compter du début du sous le nom de Drouette ; elle s'est aussi appelée du nom de rivière de Saint Martin. Cette rivière prend sa source à l'étang de la Tour dans la commune de Rambouillet et se jette dans l'Eure. Elle se divise dans le village en rivière morte et en grande rivière. Un bief fut construit en 1840 pour alimenter le moulin du grand Droue. La rivière servit au flottage des bois.
Une seconde rivière, la Guéville, dite aussi rivière de Rambouillet, suit la limite de la commune avec celle de Saint-Hilarion.
Ces deux rivières subirent de nombreuses crues dont l'une des plus importantes fut celle de 1936.
Géologie et relief
Deux plateaux beaucerons surplombent les deux vallées. Ce relief accidenté dû aux derniers contreforts du bassin parisien coupe le village en plusieurs hameaux.
Le sol est composé de zones alluvionnaires récentes, de terrains du Tertiaire moyen, de sables du Stampien.
Climat
Le climat qui caractérise la commune est qualifié, en 2010, de « climat océanique dégradé des plaines du Centre et du Nord », selon la typologie des climats de la France qui compte alors huit grands types de climats en métropole. En 2020, la commune ressort du type « climat océanique altéré » dans la classification établie par Météo-France, qui ne compte désormais, en première approche, que cinq grands types de climats en métropole. Il s'agit d'une zone de transition entre le climat océanique, le climat de montagne et le climat semi-continental. Les écarts de température entre hiver et été augmentent avec l'éloignement de la mer. La pluviométrie est plus faible qu'en bord de mer, sauf aux abords des reliefs.
Les paramètres climatiques qui ont permis d'établir la typologie de 2010 comportent six variables pour les températures et huit pour les précipitations, dont les valeurs correspondent aux données mensuelles sur la normale 1971-2000. Les sept principales variables caractérisant la commune sont présentées dans l'encadré ci-après.
Avec le changement climatique, ces variables ont évolué. Une étude réalisée en 2014 par la Direction générale de l'Énergie et du Climat complétée par des études régionales prévoit en effet que la température moyenne devrait croître et la pluviométrie moyenne baisser, avec toutefois de fortes variations régionales. Ces changements peuvent être constatés sur la station météorologique de Météo-France la plus proche, « Houx », sur la commune d'Houx, mise en service en 1951 et qui se trouve à à vol d'oiseau, où la température moyenne annuelle est de et la hauteur de précipitations de pour la période 1981-2010.
Sur la station météorologique historique la plus proche, « Chartres », sur la commune de Champhol, mise en service en 1923 et à , la température moyenne annuelle évolue de pour la période 1971-2000 à pour 1981-2010, puis à pour 1991-2020.
Urbanisme
Typologie
Droue-sur-Drouette est une commune urbaine, car elle fait partie des communes denses ou de densité intermédiaire, au sens de la grille communale de densité de l'Insee.
Elle appartient à l'unité urbaine d'Épernon, une agglomération inter-régionale regroupant et en 2017, dont elle est une commune de la banlieue.
Par ailleurs la commune fait partie de l'aire d'attraction de Paris, dont elle est une commune de la couronne. Cette aire regroupe .
Occupation des sols
L'occupation des sols de la commune, telle qu'elle ressort de la base de données européenne d'occupation biophysique des sols Corine Land Cover (CLC), est marquée par l'importance des territoires agricoles (40,7 % en 2018), néanmoins en diminution par rapport à 1990 (52 %). La répartition détaillée en 2018 est la suivante :
terres arables (40,4 %), forêts (31,7 %), zones urbanisées (23 %), zones industrielles ou commerciales et réseaux de communication (4,7 %), zones agricoles hétérogènes (0,3 %).
L'IGN met par ailleurs à disposition un outil en ligne permettant de comparer l'évolution dans le temps de l'occupation des sols de la commune (ou de territoires à des échelles différentes). Plusieurs époques sont accessibles sous forme de cartes ou photos aériennes : la carte de Cassini (), la carte d'état-major (1820-1866) et la période actuelle (1950 à aujourd'hui).
Risques majeurs
Le territoire de la commune de Droue-sur-Drouette est vulnérable à différents aléas naturels : météorologiques (tempête, orage, neige, grand froid, canicule ou sécheresse), inondations, mouvements de terrains et séisme (sismicité très faible). Il est également exposé à un risque technologique, le transport de matières dangereuses. Un site publié par le BRGM permet d'évaluer simplement et rapidement les risques d'un bien localisé soit par son adresse soit par le numéro de sa parcelle.
Risques naturels
Certaines parties du territoire communal sont susceptibles d'être affectées par le risque d'inondation par débordement de cours d'eau et par une crue à débordement lent de cours d'eau, notamment la Drouette et la Guéville. La commune a été reconnue en état de catastrophe naturelle au titre des dommages causés par les inondations et coulées de boue survenues en 1999 et 2016.
La commune est vulnérable au risque de mouvements de terrains constitué principalement du retrait-gonflement des sols argileux. Cet aléa est susceptible d'engendrer des dommages importants aux bâtiments en cas d'alternance de périodes de sécheresse et de pluie. 79,8 % de la superficie communale est en aléa moyen ou fort (52,8 % au niveau départemental et 48,5 % au niveau national). Sur les dénombrés sur la commune en 2019, 434 sont en en aléa moyen ou fort, soit 90 %, à comparer aux 70 % au niveau départemental et 54 % au niveau national. Une cartographie de l'exposition du territoire national au retrait gonflement des sols argileux est disponible sur le site du BRGM.
Concernant les mouvements de terrains, la commune a été reconnue en état de catastrophe naturelle au titre des dommages causés par la sécheresse en 1989, 1991 et 2018 et par des mouvements de terrain en 1999.
Risques technologiques
Le risque de transport de matières dangereuses sur la commune est lié à sa traversée par des infrastructures routières ou ferroviaires importantes ou la présence d'une canalisation de transport d'hydrocarbures. Un accident se produisant sur de telles infrastructures est en effet susceptible d'avoir des effets graves au bâti ou aux personnes jusqu'à , selon la nature du matériau transporté. Des dispositions d'urbanisme peuvent être préconisées en conséquence.
Toponymie
Le nom de la localité est attesté sous les formes Draava au , Droa en 1260.
En 1787, les registres paroissiaux utilisent le vocable Droue, du nom de la rivière qui la traverse et qui prit le nom de La Drouette au . C'est finalement lors de la réunion du conseil municipal du que la commune reçoit son vocable actuel : Droue-sur-Drouette.
La Droue, nom du cours supérieur de la Drouette, est l'ancien nom de toute la Drouette, affluent de l'Eure.
Le nom de "Drouette", originellement "la Droue", dérive d'une racine hydronymique dur-, dora, qui signifie « cours d'eau ».
Ses habitants sont les "dorasiens" et "dorasiennes", noms adoptés par le conseil municipal du à la suite d'une consultation des habitants.
Histoire
Préhistoire
Comme dans beaucoup de villages de France, des traces de préhistoire apparaissent : haches taillées, polies, meules... sur les plateaux bordant la rivière.
Moyen Âge
Il faudra attendre 768 et l'acte royal de Pépin le Bref pour savoir que les bois locaux avaient déjà été donné au chapitre de Chartres, ce dernier ayant établi vers 88 une prêtrière au lieudit la Malmaison, commune actuelle d'Émancé. C'est de cette dernière que dépend la chapelle actuellement église paroissiale. L'existence est ancienne puisque lors d'une des diverses reconstructions de cette chapelle, il fut utilisé des pierres tombales mérovingiennes pour les bordures des plus petites fenêtres romanes côté sud. Le village en tant que châtellenie devait dépendre tout d'abord des Montfort établi à Épernon puis du duché d'Épernon sans omettre des dîmes et autres tailles à l'évêché de Chartres.
Ancien Régime
Un différend avec ces seigneurs eut lieu, le comte de Toulouse fils du roi devint propriétaire du château de Rambouillet après Fleuriau d'Armenonville qui dut le lui céder, le comte voulut étendre les chasses du château et demanda au chapitre de bien vouloir où vendre où louer les terres de la Malmaison, mais Armenonville fit tant que cela ne put se faire et il fallut attendre sa mort pour que le chapitre n'accorde un bail au duc de Penthièvre. C'est sur cette base de terres de chasse que se fit la séparation des départements, Droue ayant les terres de Bailleau-Armenonville resta en Eure-et-Loir tandis qu'Émancé faisait partie de la Seine-et-Oise.
Révolution française et Empire
Le fait de dépendre du chapitre de Chartres fit que lors des États généraux de 1789, ses représentants devaient voter à Chartres à la différence d'Épernon qui votait à Montfort-l'Amaury. Afin de préparer le cahier des doléances, la population se réunit le sous la houlette de Joseph François Nicolas Vesque, lieutenant de bailliage, et 20 comparants sur les 43 inscrits sont présents et sept seulement vont signer et élisent pour le lendemain Étienne Denis Denis pour les représenter à Chartres.
Une des premières mesures prises fut de réunir les diverses paroisses locales et surtout les biens dits de la "fabrique" pour n'en faire qu'un au profit d'Épernon. En 1793, la cloche fut fondue, les biens intérieurs furent volés par les responsables d'Épernon, l'église n'étant plus entretenue, elle menaça de s'effondrer...
Époque contemporaine
La guerre de 1870 : faisant partie de la ceinture du bassin parisien, les troupes des envahisseurs prussiens et bavarois contournant Paris, devaient le plus vite possible envahir la France et surtout empêcher l'Armée de la Loire de se constituer. Aux bataillons des gardes nationaux de défendre la patrie. Le , c'est ce que firent les nommés Martin, Ringuenoir, Roger, Lehongre, Ravet, Charlier et Babouin à la ferme du Mousseau. Assiégés, ils se défendirent comme ils purent contre tout un bataillon, seul le dernier put sortir de la ferme avant qu'elle ne soit détruite par le feu. les morts n'eurent même pas le droit d'avoir une inhumation digne de ce nom, les troupes de l'occupant refusant aux habitants d'y assister.
Politique et administration
Liste des maires
Politique environnementale
Population et société
Démographie
Enseignement
Manifestations culturelles et festivités
Économie
Culture locale et patrimoine
Lieux et monuments
L'église Saint-Pierre
Autrefois chapelle, elle dépendait de la prêtrière de la Malmaison, actuellement sur la commune d'Émancé (Yvelines). La prêtrière aurait été donné du temps de Charlemagne aux chanoines de la cathédrale de Chartres. On peut peut-être dater de cette époque la base de l'édifice construite en "arête dite de poisson" ; on peut également trouver la trace de petites fenêtres romanes. Mais comme souvent dans les villages de Beauce et de sa région, les destructions ont eu lieu, elle fut reconstruite toujours en période romane. D'autres fenêtres plus grandes d'ailleurs sont aussi visibles, l'une d'elles est faite de sarcophages mérovingiens. Une reconstruction ultérieure à la suite des guerres de religion fut faite à nouveau, ouverture de portes, de fenêtres, et construction d'une galerie. Une fenêtre gothique flamboyante fait son apparition.
À la Révolution, cela aurait pu être sa fin, la fabrique de Droue, regroupée avec celles d'Épernon, elle ne fut plus entretenue, non seulement cela mais la population voisine vint prendre lors de l'absence des habitants, sa cloche, son mobilier d'intérieur. Et ce fut grâce à la volonté du maire que l'église condamnée par le préfet put être conservée.
Celle-ci restaurée grâce à la volonté du maire Christian Cottinet fut entièrement restaurée et se retrouve être un des plus beaux joyaux des églises de campagne de la région.
Les carrières
Depuis fort longtemps, les carrières de grès furent exploitées dans la commune, la rivière la Droue à l'époque fut même canalisée par Vauban afin de pouvoir faire transporter les grès extraits des carrières entre 1685 et 1689 pour les travaux de l'aqueduc de Maintenon, prévu pour le transport des eaux de l'Eure de Pontgouin au château de Versailles par le canal Louis XIV. Mais la guerre passant par là, les travaux cessèrent en 1689. Plus tard, lors de la Révolution, un projet surgira pour permettre à ce canal, tout en l'agrandissant, d'aller de Chartres à Paris, mais ce projet resta sans suite.
Pour les carrières, il a fallu attendre 1835 pour que localement on eut l'idée de faire des finances avec ces carrières, jusqu'alors, si on avait besoin de pierres de grès, on se servait. Mais en cette année 1835, la municipalité mis à bail ces carrières pour 99 ans afin d'en tirer profit. De nombreux carriers se succédèrent les uns après les autres, parmi les plus importants on relèvera un certain Wisse d'origine suisse qui en tirait des meules afin de broyer le kaolin pour le Limousin ; il y eut aussi madame Deshoullières, messieurs Pernot, Mauduit, les frères Quéhan les uns pour des pavés, les autres des marches, certains comme le dernier plus spécialement pour les pavés de Paris. On pouvait y voir des ponts de bois, des lignes Decauville et même un téléphérique. Mais c'est surtout à partir de 1845, lors du passage du train à Épernon, que ces carrières de grès ont pu prendre un tel essor. Des carrières de meules de moulin sur l'autre rive versant sud de la rivière ont également pu voir le jour. La qualité de dureté de cette pierre était si bonne que les meules produites par les sociétés fertoises sont parties dans l'ensemble des continents.
Personnalités liées à la commune
Robert Bresson (1901-1999), cinéaste français, y est décédé.
Georges Sadoul (1904-1967), historien du cinéma et critique, y est enterré.
Pierre Richard (1934- ), acteur et réalisateur, y a sa résidence secondaire.
Le comédien Victor Lanoux (1936-2017) s'est marié dans cette commune le et y possédait une maison.
Voir aussi
Bibliographie
Notices historiques Dorasiennes - Épernon patrimoine et Alentours (2002).
Articles connexes
Liste des cours d'eau d'Eure-et-Loir
Ancienne communauté de communes du Val Drouette.
Liste des communes d'Eure-et-Loir.
Liens externes
Droue-sur-Drouette sur le site de l'Institut géographique national
Notes et références
Notes et cartes
Notes
Cartes
Références
Commune en Eure-et-Loir
Unité urbaine d'Épernon
Aire urbaine de Paris
Via Turonensis | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 3,520 | [
128000,
35,
583,
68,
68806,
9607,
583,
6672,
1826,
6316,
79245,
93424,
10109,
8047,
7010,
514,
76235,
1133,
294,
89048,
554,
97110,
12,
4357,
404,
11,
665,
88100,
14821,
12,
2257,
409,
6621,
556,
382,
38,
978,
3257,
648,
271,
61935,
4090,
720,
2356,
14458,
1826,
10109,
978,
3869,
220,
3869,
326,
17771,
294,
6,
27887,
716,
6414,
382,
43,
53819,
1773,
1220,
1880,
91329,
7183,
720,
24641,
386,
2227,
109475,
1441,
11,
514,
473,
373,
2933,
11,
514,
92917,
423,
583,
68,
11,
514,
84334,
409,
1208,
40555,
648,
382,
18461,
8699,
11,
76235,
1133,
1880,
88100,
4017,
22761,
288,
720,
8921,
79245,
1826,
4017,
48983,
3930,
76235,
1133,
951,
816,
899,
1572,
11,
88100,
60208,
273,
6953,
7424,
35206,
320,
3705,
8699,
409,
14539,
11529,
3653
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
35,
583,
68,
68806,
9607,
583,
6672,
1826,
6316,
79245,
93424,
10109,
8047,
7010,
514,
76235,
1133,
294,
89048,
554,
97110,
12,
4357,
404,
11,
665,
88100,
14821,
12,
2257,
409,
6621,
556,
382,
38,
978,
3257,
648,
271,
61935,
4090,
720,
2356,
14458,
1826,
10109,
978,
3869,
220,
3869,
326,
17771,
294,
6,
27887,
716,
6414,
382,
43,
53819,
1773,
1220,
1880,
91329,
7183,
720,
24641,
386,
2227,
109475,
1441,
11,
514,
473,
373,
2933,
11,
514,
92917,
423,
583,
68,
11,
514,
84334,
409,
1208,
40555,
648,
382,
18461,
8699,
11,
76235,
1133,
1880,
88100,
4017,
22761,
288,
720,
8921,
79245,
1826,
4017,
48983,
3930,
76235,
1133,
951,
816,
899,
1572,
11,
88100,
60208,
273,
6953,
7424,
35206,
320,
3705,
8699,
409,
14539,
11529,
3653,
-100
] |
<!DOCTYPE html>
<html lang='en'>
<head>
<meta charset='utf-8'>
<meta content='IE=edge,chrome=1' http-equiv='X-UA-Compatible'>
<meta content='width=device-width, initial-scale=1.0' name='viewport'>
<!-- Favicon -->
<link href='favicon.ico' rel='shortcut icon' type='image/x-icon'>
<!-- Typekit -->
<script src="https://use.typekit.net/ddg5xff.js"></script>
<script>try{Typekit.load({ async: true });}catch(e){}</script>
<!-- Use title if it's in the page YAML frontmatter -->
<title>Dan Denney</title>
<link href='/assets/javascripts/vendor/chartist/dist/chartist.min.css' rel='stylesheet'>
<link href="../../assets/stylesheets/application.css" rel="stylesheet" />
</head>
<body class='posts posts_tags posts_tags_front-end-dev'>
<h1>Articles tagged 'front-end-dev'</h1>
<ul>
<li><a href="/posts/front-end-dev/building-a-small-pwa-with-preact-and-firebase">Building a Small PWA with Preact and Firebase</a> <span>Jul 23</span></li>
<li><a href="/posts/front-end-dev/learning-javascript-problem-solving">I'm Learning How to Solve Problems with JavaScript</a> <span>Aug 8</span></li>
<li><a href="/posts/front-end-dev/reducing-html-email-code">Reducing HTML Email Code</a> <span>Jul 16</span></li>
<li><a href="/posts/front-end-dev/pursuing-a-nanodegree">Pursuing a Nanodegree (1 of ?)</a> <span>Jun 26</span></li>
</ul>
<footer>
<p class='dib'>
Dan Denney
</p>
<nav class='dib'>
<a class="mls" href="/posts">Posts</a>
<a class="mls" href="/blips">Blips</a>
<a class="mls" href="/tinkerings">Tinkerings</a>
<a class="mls" href="/">Home</a>
</nav>
</footer>
<script src="../../assets/javascripts/vendor.js"></script>
<!-- = javascript_include_tag 'application' -->
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','//www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-3589831-2', 'auto');
ga('send', 'pageview');
</script>
</body>
</html>
| {
"redpajama_set_name": "RedPajamaGithub"
} | 7,250 | [
128000,
13853,
15822,
5385,
397,
14063,
8859,
1151,
268,
9723,
16747,
397,
18816,
11878,
1151,
4867,
12,
23,
9723,
18816,
2262,
1151,
5484,
37040,
11,
33002,
28,
16,
6,
1795,
23793,
1151,
55,
37836,
38362,
9723,
18816,
2262,
1151,
3175,
20297,
9531,
11,
2926,
13230,
28,
16,
13,
15,
6,
836,
1151,
18774,
9723,
6499,
435,
29021,
3743,
13994,
1839,
1151,
55657,
40286,
6,
1375,
1151,
47457,
4706,
6,
955,
1151,
1843,
11009,
7971,
9723,
6499,
4078,
8390,
3743,
7890,
2338,
429,
2485,
1129,
817,
4957,
8390,
5181,
45981,
70,
20,
9197,
2927,
2043,
2334,
397,
7890,
29,
1568,
90,
941,
8390,
5214,
2358,
3393,
25,
837,
18605,
92,
7320,
2069,
6226,
5474,
2334,
397,
6499,
5560,
2316,
422,
433,
596,
304,
279,
2199,
54227,
4156,
60065,
3743
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
13853,
15822,
5385,
397,
14063,
8859,
1151,
268,
9723,
16747,
397,
18816,
11878,
1151,
4867,
12,
23,
9723,
18816,
2262,
1151,
5484,
37040,
11,
33002,
28,
16,
6,
1795,
23793,
1151,
55,
37836,
38362,
9723,
18816,
2262,
1151,
3175,
20297,
9531,
11,
2926,
13230,
28,
16,
13,
15,
6,
836,
1151,
18774,
9723,
6499,
435,
29021,
3743,
13994,
1839,
1151,
55657,
40286,
6,
1375,
1151,
47457,
4706,
6,
955,
1151,
1843,
11009,
7971,
9723,
6499,
4078,
8390,
3743,
7890,
2338,
429,
2485,
1129,
817,
4957,
8390,
5181,
45981,
70,
20,
9197,
2927,
2043,
2334,
397,
7890,
29,
1568,
90,
941,
8390,
5214,
2358,
3393,
25,
837,
18605,
92,
7320,
2069,
6226,
5474,
2334,
397,
6499,
5560,
2316,
422,
433,
596,
304,
279,
2199,
54227,
4156,
60065,
3743,
-100
] |
Q: Is there something like parse_url in Objective C? Is there there somethings like parse_url() equivalent in Objective C?
I like the simplicity of this function in PHP and need the same thing in an iPhone app. For example:
given a url http://www.google.com/?someting=somthing
I can get a nice data structure with the host, protocol, base url...etc, without having to create parse strings.
Thanks
A: There's NSURL. You can create an NSURL from a string and then use methods like baseURL, path, query, etc.
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 7,662 | [
128000,
48,
25,
2209,
1070,
2555,
1093,
4820,
2975,
304,
55389,
356,
30,
2209,
1070,
1070,
1794,
774,
826,
1093,
4820,
2975,
368,
13890,
304,
55389,
356,
5380,
40,
1093,
279,
40075,
315,
420,
734,
304,
13420,
323,
1205,
279,
1890,
3245,
304,
459,
12443,
917,
13,
1789,
3187,
512,
43068,
264,
2576,
1795,
1129,
2185,
5831,
916,
18236,
82,
4512,
287,
14481,
316,
1626,
198,
40,
649,
636,
264,
6555,
828,
6070,
449,
279,
3552,
11,
11766,
11,
2385,
2576,
1131,
12380,
11,
2085,
3515,
311,
1893,
4820,
9246,
627,
12947,
271,
32,
25,
2684,
596,
40963,
13,
1472,
649,
1893,
459,
40963,
505,
264,
925,
323,
1243,
1005,
5528,
1093,
57841,
11,
1853,
11,
3319,
11,
5099,
627,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0
] | [
48,
25,
2209,
1070,
2555,
1093,
4820,
2975,
304,
55389,
356,
30,
2209,
1070,
1070,
1794,
774,
826,
1093,
4820,
2975,
368,
13890,
304,
55389,
356,
5380,
40,
1093,
279,
40075,
315,
420,
734,
304,
13420,
323,
1205,
279,
1890,
3245,
304,
459,
12443,
917,
13,
1789,
3187,
512,
43068,
264,
2576,
1795,
1129,
2185,
5831,
916,
18236,
82,
4512,
287,
14481,
316,
1626,
198,
40,
649,
636,
264,
6555,
828,
6070,
449,
279,
3552,
11,
11766,
11,
2385,
2576,
1131,
12380,
11,
2085,
3515,
311,
1893,
4820,
9246,
627,
12947,
271,
32,
25,
2684,
596,
40963,
13,
1472,
649,
1893,
459,
40963,
505,
264,
925,
323,
1243,
1005,
5528,
1093,
57841,
11,
1853,
11,
3319,
11,
5099,
627,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Focus on structure, weight, and flavor profile. You want both the food and wine to stand up nicely and not overpower one another. We recommend that you look at the dish as a whole, not just the main component or protein of the dish. At the winery, we pay close attention to the sauces, spices, and smaller items that are part of the entire plate. The end goal is to make everything sing and dance together in harmony. Below are a few tips on where to begin your epicurean journey.
Complimentary – multiple components of a dish have similar flavors to the wine. However, you still want some qualities that are different. We like to recommend that when going with the 'complimentary' style, acid and tannins really help liven up the pairing while accentuating the fruit without being boring.
Contrast – pairing a wine with a dish that has very little or no similar components. For example, sweet and salty or spicy creamy. A wonderful pairing is Mahi Tacos with Habanero Mango Aioli paired with our Viognier. The creaminess of the wine tones down the spice of the aioli while allowing the flavors to shine. The acid cuts through the weight of the aioli keeping the dish fresh and bright.
Regional – Regional matches aren't always the perfect pairing but they do work, especially if you're short on time. They are a great way to begin to understand more about what's going on structurally with wine and food pairings. Ask yourself, where does this varietal originate from? A great example of a regional pairing is Paella and Tempranillo. Both originate from Spain's Rioja region. Another classic is Barbera and Truffles. A good way to think about this is people have been making this wine and cooking this food together for hundreds of years. It WILL be good.
Acid and Fat – Nothing cuts through fat like wine with great acidity. A good glass of Sparkling or Champagne is a classic. Pairing a high acid wine with a heavy dish brings out an array of interesting flavors.
Acidity in wine pairs well with fatty and sweet foods. The acidity gives the wine a 'backbone' to stand up to the food.
Alcohol can be used to cut through fatty foods or balance a sweet dish. The high alcohol prevents the food from overpowering the wine.
Fruit Characteristics – A good guide is to pair similar color fruit characteristics with a wine. For example, pair red fruits with red fruit wine qualities. Pair blue fruit with blue fruit qualities. Adding contrasting fruits often will counter balance.
Bitter and Fat elevate each other and is a classic pairing. The bitterness mellows out the fat letting other qualities step forward. Bitter with bitter does not work. Fat is needed to alleviate bitterness.
Fat and Creamy benefit from acid and/or a little bit of tartness. For example, our White Wine blend with Chicken Picatta is a game changer. The wine's acid and fruit really accentuates the flavors and seasonings of the sauce and chicken.
Fatty foods need either an acidic or high alcohol wine, otherwise the fat overwhelms the wine and it tastes flabby.
Salty shouldn't compete with acidity in wine. Too much salt and acid together is not good.
Spicy foods pair well with sweeter wines and more full-bodied creamy whites. An oaky, malolactic white wine and spicy Cuban dishes are excellent pairings.
Sweet and Salty – Ever have chocolate covered pretzels or candied maple bacon? The salt and sweet battle each other but it ends up being a tug of war of deliciousness. A little bit of salt opens your taste bud receptors making sweet dishes (like chocolate) taste even richer or sweeter.
Sweet food/wine benefits from a little acidity. The acid helps cut through the sweet to let the flavors step forward.
Very tannic wine can be balanced with a sweet food. Some tannic wines (based on flavor components) can go well with fat. Masculine, opulent, dark fruit wines with great tannic structure go phenomenally well with rich steak dishes.
Wine acid and food acid need to be similar. If the wine has less acidity than the food, the wine tastes flat. When pairing a dish with wine, consider the acid balance between the food and the wine. If the food is really heavy, it will sometimes benefit from a wine with higher acid.
Last but not least. Have FUN! Play around, experiment. The journey and the discovery are half the fun.
If you have any questions about pairing, send us an email. | {
"redpajama_set_name": "RedPajamaC4"
} | 1,078 | [
128000,
14139,
389,
6070,
11,
4785,
11,
323,
17615,
5643,
13,
1472,
1390,
2225,
279,
3691,
323,
13378,
311,
2559,
709,
29921,
323,
539,
98887,
832,
2500,
13,
1226,
7079,
430,
499,
1427,
520,
279,
12269,
439,
264,
4459,
11,
539,
1120,
279,
1925,
3777,
477,
13128,
315,
279,
12269,
13,
2468,
279,
3243,
727,
11,
584,
2343,
3345,
6666,
311,
279,
91070,
11,
49659,
11,
323,
9333,
3673,
430,
527,
961,
315,
279,
4553,
12235,
13,
578,
842,
5915,
374,
311,
1304,
4395,
7936,
323,
15612,
3871,
304,
26348,
13,
21883,
527,
264,
2478,
10631,
389,
1405,
311,
3240,
701,
25706,
554,
276,
11879,
627,
1110,
501,
75643,
1389,
5361,
6956,
315,
264,
12269,
617,
4528,
32523,
311,
279,
13378,
13,
4452,
11,
499,
2103,
1390,
1063
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
14139,
389,
6070,
11,
4785,
11,
323,
17615,
5643,
13,
1472,
1390,
2225,
279,
3691,
323,
13378,
311,
2559,
709,
29921,
323,
539,
98887,
832,
2500,
13,
1226,
7079,
430,
499,
1427,
520,
279,
12269,
439,
264,
4459,
11,
539,
1120,
279,
1925,
3777,
477,
13128,
315,
279,
12269,
13,
2468,
279,
3243,
727,
11,
584,
2343,
3345,
6666,
311,
279,
91070,
11,
49659,
11,
323,
9333,
3673,
430,
527,
961,
315,
279,
4553,
12235,
13,
578,
842,
5915,
374,
311,
1304,
4395,
7936,
323,
15612,
3871,
304,
26348,
13,
21883,
527,
264,
2478,
10631,
389,
1405,
311,
3240,
701,
25706,
554,
276,
11879,
627,
1110,
501,
75643,
1389,
5361,
6956,
315,
264,
12269,
617,
4528,
32523,
311,
279,
13378,
13,
4452,
11,
499,
2103,
1390,
1063,
-100
] |
Wilbert "Dub" Carl Franklin was born February 20, 1943 in Clinton, La to the late Rev. Albert E and Beulah Franklin. He graduated from Central Memorial High School in Bogalusa and Southern University in Baton Rouge. Dub worked for many years at Milne Boys Home in New Orleans and Hope Haven in Marrero. After he retired he moved back to Bogalusa, LA.
On August 2, 2018, the Lord called Dub home. He leaves to cherish his memory his three children: Corey Franklin of Houston, TX; Courtni Franklin of Slidell, LA and Akili Franklin of New Orleans, LA, one sister Joyce ( Supt Leslie) Fields of Varnado, LA and numerous grandchildren, nieces, nephews, cousins, and friends.
Dub was preceded in death by his parents, Rev. Albert and Beulah Franklin, Sr; his daughter Sharon Perkins, and three siblings, Albert E. Franklin Jr; Margaret Franklin, and Walter Franklin.
Dub will always be remembered for his ability to find humor in any situation and bringing joy and laughter to all who loved him. The "Boonies" in his life will forever miss this " Big Timer".
Visitation will be Friday, August 10, 2018 from 9:00 am until the funeral service at 11:00 am at Holy Temple COGIC. Interment at Bogalusa Cemetery.
Cook Richmond Funeral Home is in charge of arrangements. | {
"redpajama_set_name": "RedPajamaC4"
} | 518 | [
128000,
53477,
9339,
330,
74294,
1,
22770,
19372,
574,
9405,
7552,
220,
508,
11,
220,
6393,
18,
304,
8283,
11,
5034,
311,
279,
3389,
10315,
13,
17971,
469,
323,
2893,
360,
1494,
19372,
13,
1283,
33109,
505,
10913,
27872,
5234,
6150,
304,
42648,
278,
31853,
323,
16642,
3907,
304,
86269,
56747,
13,
17533,
6575,
369,
1690,
1667,
520,
10357,
818,
30857,
5492,
304,
1561,
27008,
323,
18231,
42714,
304,
69698,
2382,
13,
4740,
568,
22311,
568,
7882,
1203,
311,
42648,
278,
31853,
11,
13256,
627,
1966,
6287,
220,
17,
11,
220,
679,
23,
11,
279,
10425,
2663,
17533,
2162,
13,
1283,
11141,
311,
87785,
813,
5044,
813,
2380,
2911,
25,
55752,
19372,
315,
16386,
11,
17467,
26,
6377,
1546,
72,
19372,
315,
6995,
307,
616,
11,
13256,
323
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
53477,
9339,
330,
74294,
1,
22770,
19372,
574,
9405,
7552,
220,
508,
11,
220,
6393,
18,
304,
8283,
11,
5034,
311,
279,
3389,
10315,
13,
17971,
469,
323,
2893,
360,
1494,
19372,
13,
1283,
33109,
505,
10913,
27872,
5234,
6150,
304,
42648,
278,
31853,
323,
16642,
3907,
304,
86269,
56747,
13,
17533,
6575,
369,
1690,
1667,
520,
10357,
818,
30857,
5492,
304,
1561,
27008,
323,
18231,
42714,
304,
69698,
2382,
13,
4740,
568,
22311,
568,
7882,
1203,
311,
42648,
278,
31853,
11,
13256,
627,
1966,
6287,
220,
17,
11,
220,
679,
23,
11,
279,
10425,
2663,
17533,
2162,
13,
1283,
11141,
311,
87785,
813,
5044,
813,
2380,
2911,
25,
55752,
19372,
315,
16386,
11,
17467,
26,
6377,
1546,
72,
19372,
315,
6995,
307,
616,
11,
13256,
323,
-100
] |
In the podcast, Aesha talks about the commonality of sensitive people who felt that they never fit in and thought themselves weird. And how that desire to be true to oneself and find ones place in the world leads to acceptance of who you are, the discovery of your gifts which turns into a superpower that can help others.
Want to know what I need to do or know.
Awesome! That's a great first step – getting curious. Now see what the Universe puts in front of you to explore next. It will be your next step.
Are you a visionary, a wise soothsayer, or a bold spiritual leader?
I'm not your average psychic, unless cake eating, rescue dog loving clairvoyants who can't cook rice are the new normal. Like Glinda the Good Witch, I believe you've always had the power, m'dear.
I'm not your average psychic, unless cake eating, rescue dog loving clairvoyants who can't cook rice are suddenly the new normal. Like Glinda the Good Witch, I believe you've always had the power, m'dear. | {
"redpajama_set_name": "RedPajamaC4"
} | 7,684 | [
128000,
644,
279,
18181,
11,
362,
288,
4317,
13739,
922,
279,
4279,
2786,
315,
16614,
1274,
889,
6612,
430,
814,
2646,
5052,
304,
323,
3463,
5694,
16682,
13,
1628,
1268,
430,
12876,
311,
387,
837,
311,
57669,
323,
1505,
6305,
2035,
304,
279,
1917,
11767,
311,
26586,
315,
889,
499,
527,
11,
279,
18841,
315,
701,
21258,
902,
10800,
1139,
264,
2307,
13477,
430,
649,
1520,
3885,
627,
29923,
311,
1440,
1148,
358,
1205,
311,
656,
477,
1440,
627,
27997,
0,
3011,
596,
264,
2294,
1176,
3094,
1389,
3794,
22999,
13,
4800,
1518,
1148,
279,
29849,
9711,
304,
4156,
315,
499,
311,
13488,
1828,
13,
1102,
690,
387,
701,
1828,
3094,
627,
11787,
499,
264,
87490,
11,
264,
24219,
779,
8942,
82,
1155,
11,
477,
264,
14265,
18330
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
644,
279,
18181,
11,
362,
288,
4317,
13739,
922,
279,
4279,
2786,
315,
16614,
1274,
889,
6612,
430,
814,
2646,
5052,
304,
323,
3463,
5694,
16682,
13,
1628,
1268,
430,
12876,
311,
387,
837,
311,
57669,
323,
1505,
6305,
2035,
304,
279,
1917,
11767,
311,
26586,
315,
889,
499,
527,
11,
279,
18841,
315,
701,
21258,
902,
10800,
1139,
264,
2307,
13477,
430,
649,
1520,
3885,
627,
29923,
311,
1440,
1148,
358,
1205,
311,
656,
477,
1440,
627,
27997,
0,
3011,
596,
264,
2294,
1176,
3094,
1389,
3794,
22999,
13,
4800,
1518,
1148,
279,
29849,
9711,
304,
4156,
315,
499,
311,
13488,
1828,
13,
1102,
690,
387,
701,
1828,
3094,
627,
11787,
499,
264,
87490,
11,
264,
24219,
779,
8942,
82,
1155,
11,
477,
264,
14265,
18330,
-100
] |
Universiade 2015 Deploys JBL VTX And Crown I-Tech HD In South Korea
Sound Reinforcement
South Korean Harman Pro distributor Techdata and audio rental company Total Korea recently provided the sound reinforcement systems at the opening and closing ceremonies of the 2015 Universiade in Gwangju, South Korea.
To cater to the sheer volume of people attending this event, Total Korea opted for Harman's JBL VTX line arrays and Crown I-Tech HD amplifiers, and enlisted technical support from Techdata.
Approximately 20,000 student athletes from 170 countries came to the fourth-largest city in South Korea from July 3-14 to participate in a cultural, athletic and educational multi-sport event that symbolizes the fusion of the concepts "University" and "Olympiad."
The second-largest sporting event after the Olympics, the Universiade featured immense ceremonies that took place at the Gwangju Universiade Main Stadium, also known as the Gwangju World Cup Stadium.
Total Korea provided the stadium with 48 JBL VTX V25 line array loudspeakers and 36 VERTEC VT4889 line array loudspeakers, all of which were powered by 103 Crown I-Tech 12000HD amplifiers.
TechData was onsite to manage the system, and assisted with modeling and system tuning. Using JBL HiQnet Performance Manager, the engineers maintained a consistent SPL at a frequency range between 250hz and 4Khz.
"The Universiade committee wanted a high-quality system that was stable and powerful enough to deliver its message during the ceremonies," said Cheol Yoon, GM at Techdata.
"The JBL line arrays allowed us to carry out this task without problems and maintained good coverage over the entire stadium. The Crown amplifiers provided plenty of headroom and helped us achieve the stability that the committee sought."
Harman Pro
Total Korea
Electro-Voice & Dynacord Team Up To Deliver Audio Upgrade At Stadium In South Korea
Shure TwinPlex Headset Mics For The Panelists On "The Masked Dancer"
Producer/Artist Thomas Statnick Invests In Neve 8424 | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 8,033 | [
128000,
65715,
72,
1037,
220,
679,
20,
4241,
34398,
622,
9574,
650,
23715,
1628,
29743,
358,
9469,
4842,
12445,
763,
4987,
12126,
198,
16493,
47169,
11167,
198,
26070,
16526,
5340,
1543,
1322,
44168,
17829,
695,
323,
7855,
19160,
2883,
10884,
12126,
6051,
3984,
279,
5222,
72378,
6067,
520,
279,
8736,
323,
15676,
60283,
315,
279,
220,
679,
20,
15915,
72,
1037,
304,
480,
71652,
8783,
11,
4987,
12126,
627,
1271,
29068,
311,
279,
33638,
8286,
315,
1274,
24096,
420,
1567,
11,
10884,
12126,
41867,
369,
5340,
1543,
596,
622,
9574,
650,
23715,
1584,
18893,
323,
29743,
358,
9469,
4842,
12445,
23201,
12099,
11,
323,
69576,
11156,
1862,
505,
17829,
695,
627,
70620,
7253,
220,
508,
11,
931,
5575,
23579,
505,
220,
8258,
5961,
3782,
311,
279,
11999,
68067
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
65715,
72,
1037,
220,
679,
20,
4241,
34398,
622,
9574,
650,
23715,
1628,
29743,
358,
9469,
4842,
12445,
763,
4987,
12126,
198,
16493,
47169,
11167,
198,
26070,
16526,
5340,
1543,
1322,
44168,
17829,
695,
323,
7855,
19160,
2883,
10884,
12126,
6051,
3984,
279,
5222,
72378,
6067,
520,
279,
8736,
323,
15676,
60283,
315,
279,
220,
679,
20,
15915,
72,
1037,
304,
480,
71652,
8783,
11,
4987,
12126,
627,
1271,
29068,
311,
279,
33638,
8286,
315,
1274,
24096,
420,
1567,
11,
10884,
12126,
41867,
369,
5340,
1543,
596,
622,
9574,
650,
23715,
1584,
18893,
323,
29743,
358,
9469,
4842,
12445,
23201,
12099,
11,
323,
69576,
11156,
1862,
505,
17829,
695,
627,
70620,
7253,
220,
508,
11,
931,
5575,
23579,
505,
220,
8258,
5961,
3782,
311,
279,
11999,
68067,
-100
] |
The goal of the WebRoam Program is to enable you to successfully achieve unprecedented growth and profit potential by delivering superior, next generation multi-threat security solutions to your customers. WebRoam connects you to the resources needed to develop your expertise, grow your business, increase customer satisfaction, and maximize your profitability.
WebRoam works in conjunction with its channel partners to deliver complete solutions for our global customers. If you are interested in joining the WebRoam Program, please fill in the form below.
Thank you for your interest in the WebRoam Partnership Program!
WebRoam Solution Partners play a leading role in providing WebRoam products and services. WebRoam is committed to working with its Solution Partners to help them succeed. In addition, we offer ongoing education and training, industry leading programs, deal registration, and marketing building blocks, all which can assist you and your sales teams in staying competitive in the market and ultimately, help grow your business. | {
"redpajama_set_name": "RedPajamaC4"
} | 2,818 | [
128000,
791,
5915,
315,
279,
5000,
39972,
309,
6826,
374,
311,
7431,
499,
311,
7946,
11322,
31069,
6650,
323,
11626,
4754,
555,
24944,
16757,
11,
1828,
9659,
7447,
56844,
4868,
10105,
311,
701,
6444,
13,
5000,
39972,
309,
34161,
499,
311,
279,
5070,
4460,
311,
2274,
701,
19248,
11,
3139,
701,
2626,
11,
5376,
6130,
24617,
11,
323,
35608,
701,
63336,
627,
6109,
39972,
309,
4375,
304,
32546,
449,
1202,
5613,
8717,
311,
6493,
4686,
10105,
369,
1057,
3728,
6444,
13,
1442,
499,
527,
8173,
304,
18667,
279,
5000,
39972,
309,
6826,
11,
4587,
5266,
304,
279,
1376,
3770,
627,
13359,
499,
369,
701,
2802,
304,
279,
5000,
39972,
309,
47362,
6826,
4999,
6109,
39972,
309,
12761,
23663,
1514,
264,
6522,
3560,
304,
8405,
5000,
39972,
309,
3956
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
5915,
315,
279,
5000,
39972,
309,
6826,
374,
311,
7431,
499,
311,
7946,
11322,
31069,
6650,
323,
11626,
4754,
555,
24944,
16757,
11,
1828,
9659,
7447,
56844,
4868,
10105,
311,
701,
6444,
13,
5000,
39972,
309,
34161,
499,
311,
279,
5070,
4460,
311,
2274,
701,
19248,
11,
3139,
701,
2626,
11,
5376,
6130,
24617,
11,
323,
35608,
701,
63336,
627,
6109,
39972,
309,
4375,
304,
32546,
449,
1202,
5613,
8717,
311,
6493,
4686,
10105,
369,
1057,
3728,
6444,
13,
1442,
499,
527,
8173,
304,
18667,
279,
5000,
39972,
309,
6826,
11,
4587,
5266,
304,
279,
1376,
3770,
627,
13359,
499,
369,
701,
2802,
304,
279,
5000,
39972,
309,
47362,
6826,
4999,
6109,
39972,
309,
12761,
23663,
1514,
264,
6522,
3560,
304,
8405,
5000,
39972,
309,
3956,
-100
] |
A few years ago I had the opportunity to sculpt in clay from live models. While working on the modeling of a lovely older African American woman, I admired and vicariously caressed her face, contemplating attitudes and assumptions inbred into the dominant culture about beauty, race and age.
I later reinterpreted the sculpture in wood. Committed to functionality, I placed her face on a cabinet/pedestal fronted by a door with marquetry inspired by Congolese kuba cloth. Kuba cloth is notable in having no exact repeats in its intriguing bold patterns.
Old growth fir, walnut, ebony, bloodwood, painted MDF, marquetry veneers of ebony, bloodwood, satinwood, holly, black dyed wood. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,369 | [
128000,
32,
2478,
1667,
4227,
358,
1047,
279,
6776,
311,
27863,
304,
37148,
505,
3974,
4211,
13,
6104,
3318,
389,
279,
34579,
315,
264,
17104,
9191,
11904,
3778,
5333,
11,
358,
64747,
323,
32531,
277,
13610,
2211,
14715,
1077,
3663,
11,
79342,
33726,
323,
32946,
304,
91842,
1139,
279,
25462,
7829,
922,
13444,
11,
7102,
323,
4325,
627,
40,
3010,
312,
94561,
279,
51067,
304,
7732,
13,
1219,
5600,
311,
15293,
11,
358,
9277,
1077,
3663,
389,
264,
22685,
4420,
291,
478,
278,
4156,
291,
555,
264,
6134,
449,
3678,
447,
15501,
14948,
555,
7409,
1286,
325,
597,
31529,
28392,
13,
735,
31529,
28392,
374,
28289,
304,
3515,
912,
4839,
44694,
304,
1202,
41765,
14265,
12912,
627,
18788,
6650,
35092,
11,
93729,
11,
54196,
11,
6680,
6798,
11
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
32,
2478,
1667,
4227,
358,
1047,
279,
6776,
311,
27863,
304,
37148,
505,
3974,
4211,
13,
6104,
3318,
389,
279,
34579,
315,
264,
17104,
9191,
11904,
3778,
5333,
11,
358,
64747,
323,
32531,
277,
13610,
2211,
14715,
1077,
3663,
11,
79342,
33726,
323,
32946,
304,
91842,
1139,
279,
25462,
7829,
922,
13444,
11,
7102,
323,
4325,
627,
40,
3010,
312,
94561,
279,
51067,
304,
7732,
13,
1219,
5600,
311,
15293,
11,
358,
9277,
1077,
3663,
389,
264,
22685,
4420,
291,
478,
278,
4156,
291,
555,
264,
6134,
449,
3678,
447,
15501,
14948,
555,
7409,
1286,
325,
597,
31529,
28392,
13,
735,
31529,
28392,
374,
28289,
304,
3515,
912,
4839,
44694,
304,
1202,
41765,
14265,
12912,
627,
18788,
6650,
35092,
11,
93729,
11,
54196,
11,
6680,
6798,
11,
-100
] |
David W. Stempel
[email protected]
Nashville P: 615.252.4632 F: 615.252.4704
Yvette Stinson
P: 615.252.3527 [email protected]
Download V-Card
Print My Bio
David Stempel is a business transactions lawyer and has worked with clients in many different industries on mergers, acquisitions, sales, joint ventures, and capital raising transactions. He has significant experience in representing healthcare companies, including ambulatory surgery centers and home health companies, and helping those healthcare clients implement their growth and development strategies by structuring, negotiating and closing complex business transactions.
David earned his law degree, cum laude, from the University of Tennessee in May of 2005. During law school, he was a staff member of the Tennessee Law Review. He received his undergraduate degree in Mathematics from Vanderbilt University in 2002.
Ambulatory Surgery, Outpatient Imaging & Other Outpatient Services
Healthcare Mergers, Acquisitions, & Joint Ventures
Capital Markets & Corporate Finance
University of Tennessee College of Law, J.D., 2005, cum laude
Vanderbilt University, B.S., 2002
Professional & Community Activities
American Health Law Association
Nashville Bar Association
Tennessee Bar Association
Listed in The Best Lawyers in America®, Corporate Law, 2016-2022 M&A Advisor 9th Annual Emerging Leader Award, 2018 Disposition of three hospitals and sale of fourth Representation in the disposition of three hospitals in Oklahoma to a third party buyer and sale of a fourth to the Hospital Authority, with seller financing. $36 million acquisition of office park Representation in the $36 million acquisition of Green Hills Office Park in Hillsboro Plaza in Nashville, Tennessee. $40 million divestiture $40 million sale of telecommunications company. $42 million acquisition $42 million acquisition by private equity firm of agricultural manufacturing company. $5.5 million sale of company Represented company with the $5.5 million sale of the company to a IT hosting and management company. $60 million private equity investment Counseled a developer of urgent care centers in connection with a $60 million private equity investment by major private equity firm. Acquisition of a Controlling Interest in an Ambulatory Surgery Center in Detroit, Michigan Represented a publicly traded owner and operator of ambulatory surgery centers and surgical hospitals, as part of a joint venture with a non-profit, in the acquisition of an ambulatory surgery center in Detroit, Michigan. Acquisition of Strategic Technology Represented network security company with respect to the strategic acquisition of a provider of network security and risk management software and services. Cross Border Acquisition Represented network security company in connection with an acquisition of a company based in Luxembourg for $60 million in cash and stock. Sale of Drives, LLC Represented Drives, LLC, a worldwide leading manufacturer of chains and auger products for the agriculture industry, based in Fulton, Illinois, and its majority unitholders, in the sale of all the units of Drives, LLC to the Timken Company (NYSE: TKR), a global manufacturer of bearing, alloy steels, and related components and assemblies. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 6,209 | [
128000,
23083,
468,
13,
800,
3342,
301,
198,
16032,
3342,
301,
31,
1347,
329,
3258,
916,
198,
45,
1003,
8078,
393,
25,
220,
21385,
13,
12326,
13,
21290,
17,
435,
25,
220,
21385,
13,
12326,
13,
17711,
19,
198,
56,
58330,
800,
29973,
198,
47,
25,
220,
21385,
13,
12326,
13,
16482,
22,
379,
267,
29973,
31,
1347,
329,
3258,
916,
198,
11631,
650,
12,
5889,
198,
9171,
3092,
24432,
198,
23083,
800,
3342,
301,
374,
264,
2626,
14463,
15779,
323,
706,
6575,
449,
8403,
304,
1690,
2204,
19647,
389,
18970,
388,
11,
63948,
11,
6763,
11,
10496,
66724,
11,
323,
6864,
19054,
14463,
13,
1283,
706,
5199,
3217,
304,
14393,
18985,
5220,
11,
2737,
9049,
38220,
15173,
19169,
323,
2162,
2890,
5220,
11,
323,
10695,
1884,
18985
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
23083,
468,
13,
800,
3342,
301,
198,
16032,
3342,
301,
31,
1347,
329,
3258,
916,
198,
45,
1003,
8078,
393,
25,
220,
21385,
13,
12326,
13,
21290,
17,
435,
25,
220,
21385,
13,
12326,
13,
17711,
19,
198,
56,
58330,
800,
29973,
198,
47,
25,
220,
21385,
13,
12326,
13,
16482,
22,
379,
267,
29973,
31,
1347,
329,
3258,
916,
198,
11631,
650,
12,
5889,
198,
9171,
3092,
24432,
198,
23083,
800,
3342,
301,
374,
264,
2626,
14463,
15779,
323,
706,
6575,
449,
8403,
304,
1690,
2204,
19647,
389,
18970,
388,
11,
63948,
11,
6763,
11,
10496,
66724,
11,
323,
6864,
19054,
14463,
13,
1283,
706,
5199,
3217,
304,
14393,
18985,
5220,
11,
2737,
9049,
38220,
15173,
19169,
323,
2162,
2890,
5220,
11,
323,
10695,
1884,
18985,
-100
] |
Cookies help us make sure you get the most from our website. If you continue to the rest of the site, we'll assume that you're as comfortable with that as we are. And rest assured, Scottish Swimming always respects your privacy.
Membership Check
Learn to Swim Home
Learn to Swim Framework
Swim Schools
Swim Social
Swim Social Home
Coached Classes in Your Area
Becoming a Master
Swim Social Newsletters
Clubs Home
Set up a club
Develop Your Club
Club Marketing Toolkit
Young Volunteer Programme
Compete Home
Non Residential Members
Help and Guidelines
Scottish Swimming Awards
Education Info & Policies
Qualifications Comparison
Licensing & Benefits
CPD for Coaches & Teachers
Events Calendar Home
Aquatic Events
Search Dropdown Button
Revealed: Birmingham 2022 venue plan
Artist's impression of the pool inside the new Aquatics Centre for Birmingham 2022
The Sport and Venue Programme for the Birmingham 2022 Commonwealth Games has been confirmed, with the brand new Aquatics Centre one of five venues designed and developed specifically for the Games.
Watch the video below for a bird's eye view of the facilities, including the location of the bespoke Aquatics Centre.
17 sports will take place over 11 days of action-packed competition, at venues across the host city and throughout the West Midlands and beyond. Over one million tickets will be available – and go on sale closer to the event. All of the venues are already open – with the exception of the new Aquatics Centre planned to be built in Sandwell – and well-established and experienced hosts of world-class sport. This was a key benefit of the original bid, supporting the Games Partners and Commonwealth Sports Movement's ambitions to increase the efficiency and affordability of hosting the Games.
Cllr Ian Ward, Birmingham City Council Leader said: "This city has a very strong track record of successfully staging major championships and athletes love competing in front of enthusiastic and knowledgeable Birmingham audiences. In 2022, the world's top stars are guaranteed a warm welcome over what we can be sure will be 11 unforgettable days of sporting action in top-class facilities."
Tracey Crouch, Minister for Sport and Civil Society, said: "The Commonwealth Games will showcase the very best of Birmingham, the West Midlands and the UK to the rest of the world. This is an exciting sport programme that will be held at some of the region's most iconic sites and venues. I am particularly pleased that it features an inclusive para-sport programme and equal medal opportunities for men and women."
John Crabtree, Chairman of the Birmingham Organising Committee of the 2022 Commonwealth Games said: "With the revamp of Alexander Stadium, plans for a brand-new facility at Sandwell and a tried and tested team of sporting venues across the West Midlands – all our collaborative efforts are focused on ensuring the Birmingham 2022 Commonwealth Games will be a spectacular sporting showcase of the city and region."
12 of the 17 sports take place in existing venues across the host city: Athletics and Para-Athletics will take place at a significantly-upgraded Alexander Stadium, located close to the Commonwealth Games Village; Arena Birmingham will host Gymnastics; whilst the NEC campus will host six sports – Badminton, Boxing, Judo, Table Tennis, Weightlifting (and Para Powerlifting) and Wrestling. Birmingham University's facilities will be home to Hockey and Squash; and Aston Villa's football ground Villa Park will be the stadium for the Rugby Sevens action. A city-centre location for the 3x3 Basketball and Wheelchair Basketball events is still being finalised.
Venues across the West Midlands will also help maximise and spread the involvement and benefits to regional communities close to Birmingham, with Swimming and Diving at a brand-new Aquatics Facility in Sandwell (6 miles from Birmingham City Centre); Triathlon taking place at Sutton Park in Sutton Coldfield (6 miles); Mountain Biking at Cannock Chase (16 miles); Netball at the Coventry Arena (17 miles) and Lawn Bowls in Royal Leamington Spa (21 miles). Finally, the velodrome at Lee Valley VeloPark will host Track Cycling on the tenth anniversary of the London 2012 Olympic Games (102 miles).
The sport programme for Birmingham 2022 includes all mandatory sports and disciplines as per Commonwealth Games Federation rules, as well as an approved selection of optional sports chosen by the local bid committee: Diving, 3x3 Basketball and Wheelchair Basketball, Mountain Biking, Track Cycling and Track Para-Cycling, Rhythmic Gymnastics, and Para-Triathlon.
Wheelchair Basketball makes its appearance at the Commonwealth Games for the first time ever in 2022, and organisers have committed to ensuring that the 2022 edition builds on the Commonwealth Games' track record of inclusive para-sport and gender equal medal opportunities.
There remains interest from a number of additional sports and disciplines over and above what has already been announced. The Organising Committee is therefore currently conducting an additional Sports Review and Costing to look at the possibility of including additional sports to the Games.
A version of this article originally appeared on www.britishswimming.org.
Find a Pool or Club
Enter Postcode, City, or Keyword
Select Pool or Club Please select... Pool Club
(c) Scottish Swimming 2019
Swim Wales
The ASA
Twitter YouTube Facebook Soundcloud Instagram Flickr | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 1,453 | [
128000,
51772,
1520,
603,
1304,
2771,
499,
636,
279,
1455,
505,
1057,
3997,
13,
1442,
499,
3136,
311,
279,
2800,
315,
279,
2816,
11,
584,
3358,
9855,
430,
499,
2351,
439,
10882,
449,
430,
439,
584,
527,
13,
1628,
2800,
28478,
11,
27188,
75800,
2744,
43666,
701,
12625,
627,
82004,
4343,
198,
24762,
311,
69333,
5492,
198,
24762,
311,
69333,
24686,
198,
13521,
318,
31483,
198,
13521,
318,
9983,
198,
13521,
318,
9983,
5492,
198,
7489,
3939,
34969,
304,
4718,
12299,
198,
33,
762,
18238,
264,
11060,
198,
13521,
318,
9983,
5513,
21731,
198,
5176,
16115,
5492,
198,
1681,
709,
264,
6469,
198,
21076,
4718,
10349,
198,
54849,
18729,
55876,
198,
41672,
65535,
47516,
198,
76139,
68,
5492,
198,
8284,
55555,
17384,
198,
12978,
323,
48528,
198,
39320
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
51772,
1520,
603,
1304,
2771,
499,
636,
279,
1455,
505,
1057,
3997,
13,
1442,
499,
3136,
311,
279,
2800,
315,
279,
2816,
11,
584,
3358,
9855,
430,
499,
2351,
439,
10882,
449,
430,
439,
584,
527,
13,
1628,
2800,
28478,
11,
27188,
75800,
2744,
43666,
701,
12625,
627,
82004,
4343,
198,
24762,
311,
69333,
5492,
198,
24762,
311,
69333,
24686,
198,
13521,
318,
31483,
198,
13521,
318,
9983,
198,
13521,
318,
9983,
5492,
198,
7489,
3939,
34969,
304,
4718,
12299,
198,
33,
762,
18238,
264,
11060,
198,
13521,
318,
9983,
5513,
21731,
198,
5176,
16115,
5492,
198,
1681,
709,
264,
6469,
198,
21076,
4718,
10349,
198,
54849,
18729,
55876,
198,
41672,
65535,
47516,
198,
76139,
68,
5492,
198,
8284,
55555,
17384,
198,
12978,
323,
48528,
198,
39320,
-100
] |
VISITATION TEMPORARILY RESTRICTED AT ELIZABETHTOWN COMMUNITY HOSPITAL
Elizabethtown, NY – On Tuesday, November 30, the University of Vermont Health Network - Elizabethtown Community Hospital updated its visitor policy as a preventive measure to protect against the spread of COVID-19.
The temporary change allows hospitalized patients to have one visitor between 12:30 to 2:30 pm and 4:30 to 6:30 pm. One support person may accompany patients in the emergency department, outpatient clinics, and health centers.
"The health and safety of our patients, staff, and community is our highest priority," said Elizabethtown Community Hospital Vice President and Chief Nursing Officer Julie Tromblee. "We made the decision to limit visitation in response to the continued high prevalence of COVID-19 -- above 7% community transmission -- in our region."
Since March, 2020, ECH has implemented the following safety protocols:
All employees arriving for work are screened with health questions and a temperature check.
All arriving patients are screened upon entry. Patients with symptoms or suspected exposure to a COVID-positive case are treated in dedicated rooms.
Strictly following Centers for Disease Control and Prevention and New York State Department of Health guidelines on personal protective equipment. All employees are required to wear masks.
Enhanced cleaning protocols, including frequent sanitization of high-touch surfaces.
Special considerations for pediatric patients, end of life care patients, and patients with an intellectual, developmental, or cognitive disability are included in the updated visitor policy. The temporary visitor restriction will be reassessed in the coming weeks to determine when it will be appropriate to return to limited visitation. More info: Elizabethtown Community Hospital | Visiting Hours (ech.org)
About Elizabethtown Community Hospital
The University of Vermont Health Network - Elizabethtown Community Hospital is a designated critical access hospital and the primary health care provider serving the 39,000 people who live, work and vacation in Essex County, NY and the surrounding region.
Elizabethtown Community Hospital is transforming rural health care at its main campus in Elizabethtown, NY, at a new emergency department and outpatient center at the former Moses Ludington Hospital in Ticonderoga, NY, and at six community-based primary health care centers located throughout the region. The hospital is one of the community's largest employers with 360 employees.
Across the Elizabethtown and Ticonderoga campuses, the hospital maintains two 24-hour emergency rooms, a 25-bed inpatient unit, physical therapy, laboratory, and digital radiology departments, and a variety of specialty physician clinics on a weekly and monthly basis.
Elizabethtown Community Hospital is accredited by the Joint Commission and is licensed and certified by the New York State Department of Health and the Center for Medicare and Medicaid Services.
The University of Vermont Health Network is an academic health system that is comprised of six affiliate hospitals, a multi-specialty medical group, and a home health agency. We serve the residents of Vermont and northern New York with a shared mission: working together, we improve people's lives. Our partners include:
The University of Vermont Health Network – Home Health and Hospice
Our 4,000 health care professionals are driven to provide high quality, cost-efficient care as close to home as possible. Strengthened by our academic connection to the University of Vermont, each of our hospitals remains committed to its local community by providing compassionate, personal care shaped by the latest medical advances and delivered by highly skilled experts. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 8,215 | [
128000,
58427,
964,
3579,
58531,
878,
946,
1750,
56,
26487,
40577,
1507,
7520,
17705,
2913,
1905,
1372,
2607,
7736,
52385,
57273,
473,
78916,
34288,
198,
6719,
450,
10448,
427,
785,
11,
12551,
1389,
1952,
7742,
11,
6841,
220,
966,
11,
279,
3907,
315,
35739,
6401,
8304,
482,
4072,
450,
10448,
427,
785,
12332,
15429,
6177,
1202,
20792,
4947,
439,
264,
71123,
6767,
311,
6144,
2403,
279,
9041,
315,
20562,
12,
777,
627,
791,
13643,
2349,
6276,
70340,
6978,
311,
617,
832,
20792,
1990,
220,
717,
25,
966,
311,
220,
17,
25,
966,
9012,
323,
220,
19,
25,
966,
311,
220,
21,
25,
966,
9012,
13,
3861,
1862,
1732,
1253,
19780,
6978,
304,
279,
13147,
9476,
11,
87230,
44335,
11,
323,
2890,
19169,
627,
10227,
2890,
323,
7296,
315
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
58427,
964,
3579,
58531,
878,
946,
1750,
56,
26487,
40577,
1507,
7520,
17705,
2913,
1905,
1372,
2607,
7736,
52385,
57273,
473,
78916,
34288,
198,
6719,
450,
10448,
427,
785,
11,
12551,
1389,
1952,
7742,
11,
6841,
220,
966,
11,
279,
3907,
315,
35739,
6401,
8304,
482,
4072,
450,
10448,
427,
785,
12332,
15429,
6177,
1202,
20792,
4947,
439,
264,
71123,
6767,
311,
6144,
2403,
279,
9041,
315,
20562,
12,
777,
627,
791,
13643,
2349,
6276,
70340,
6978,
311,
617,
832,
20792,
1990,
220,
717,
25,
966,
311,
220,
17,
25,
966,
9012,
323,
220,
19,
25,
966,
311,
220,
21,
25,
966,
9012,
13,
3861,
1862,
1732,
1253,
19780,
6978,
304,
279,
13147,
9476,
11,
87230,
44335,
11,
323,
2890,
19169,
627,
10227,
2890,
323,
7296,
315,
-100
] |
Is YouTube doing unsigned artists more harm than good? This piece looks at the financial arrangement between musicians and the popular video sharing platform, specifically exploring how it affects unsigned musicians.
In this new post from MusicThinkTank, Mark Knight examines how the arrangement between YouTube and unsigned artists works against the latter, often leaving them hanging financially.
"YouTube has the music industry in a head-lock, and as ad revenues keep rolling in, why would they feel the need to loosen their grip. The music industry need them. Let's not forget VEVO was the music industry's attempt to take on YouTube, and now it's nothing more than a channel on YouTube, most fans wouldn't even be aware that it was intended as an alternative destination site." | {
"redpajama_set_name": "RedPajamaC4"
} | 5,259 | [
128000,
3957,
13674,
3815,
3859,
13820,
810,
11682,
1109,
1695,
30,
1115,
6710,
5992,
520,
279,
6020,
27204,
1990,
32629,
323,
279,
5526,
2835,
11821,
5452,
11,
11951,
24919,
1268,
433,
22223,
3859,
32629,
627,
644,
420,
502,
1772,
505,
10948,
39787,
67133,
11,
4488,
23844,
49095,
1268,
279,
27204,
1990,
13674,
323,
3859,
13820,
4375,
2403,
279,
15629,
11,
3629,
9564,
1124,
21363,
39075,
627,
22336,
12115,
706,
279,
4731,
5064,
304,
264,
2010,
42872,
11,
323,
439,
1008,
30466,
2567,
20700,
304,
11,
3249,
1053,
814,
2733,
279,
1205,
311,
83842,
872,
25703,
13,
578,
4731,
5064,
1205,
1124,
13,
6914,
596,
539,
10894,
61988,
11417,
574,
279,
4731,
5064,
596,
4879,
311,
1935,
389,
13674,
11,
323,
1457,
433,
596,
4400,
810,
1109,
264,
5613
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
3957,
13674,
3815,
3859,
13820,
810,
11682,
1109,
1695,
30,
1115,
6710,
5992,
520,
279,
6020,
27204,
1990,
32629,
323,
279,
5526,
2835,
11821,
5452,
11,
11951,
24919,
1268,
433,
22223,
3859,
32629,
627,
644,
420,
502,
1772,
505,
10948,
39787,
67133,
11,
4488,
23844,
49095,
1268,
279,
27204,
1990,
13674,
323,
3859,
13820,
4375,
2403,
279,
15629,
11,
3629,
9564,
1124,
21363,
39075,
627,
22336,
12115,
706,
279,
4731,
5064,
304,
264,
2010,
42872,
11,
323,
439,
1008,
30466,
2567,
20700,
304,
11,
3249,
1053,
814,
2733,
279,
1205,
311,
83842,
872,
25703,
13,
578,
4731,
5064,
1205,
1124,
13,
6914,
596,
539,
10894,
61988,
11417,
574,
279,
4731,
5064,
596,
4879,
311,
1935,
389,
13674,
11,
323,
1457,
433,
596,
4400,
810,
1109,
264,
5613,
-100
] |
A multiplex throw is two or more balls thrown from the same hand at the same time.
Split multiplexes are throws that deliver balls to more than one hand. (Except in passing situations, this means balls are thrown from a single hand to both hands.) Balls can be thrown to the same height or different heights.
The tricks are arranged roughly in order of increasing complexity and difficulty. If you are new to multiplexes, practice these throws in the order presented. It may seem simple to practice an isolated multiplex throw, but it will help you later.
You generally build up to a multiplex pattern the same way you learned to juggle 3 balls--first with one throw, then with a 2-throw exchange. Exercises helping to integrate these throws into a regular juggling pattern are noted after some descriptions (as To practice:).
Split, same height (2 balls): To throw the balls at the same height, hold them (with your palm facing upward) in a horizontal line perpendicular to your forearm. Throw with a normal cascade motion from the center of your body. Think about your hand moving between the balls, splitting them apart. It also helps to physically separate the balls in your hand prior to the throw.
. . . To practice: Just for fun, try throwing a single ball straight up the middle and then throwing the multiplex underneath so that the two balls split around it. An easy basic move would be to use this throw to start a columns pattern.
Stacked, same hand (2 balls): "Stacked" is the equivalent of "grouped, different heights" as defined above. With your palm up, hold the balls in line with your forearm (the opposite of the split set-up). Throw basically straight up (the equivalent of a fountain motion).
Stacked, crossing (2 balls): This should be a natural outgrowth of the previous trick. Simply throw with a cascade motion rather than straight up.
. . . To practice: As you practice a two-throw exchange, make sure you are throwing under the previous throw each time. Try a basic 3-ball cascade with the 2-ball stack replacing one of the normal ball positions. This is probably the easiest continuous pattern to mentally latch onto.
. . . Also try this trick with a reverse cascade (over the top) throw. This is slightly trickier, and leads on to the next trick . . .
Split, different heights (2 balls): You may have noticed when you throw the stacked reverse-cascade throw above that one ball travelled further than the other. Again, you can accentuate this difference by flicking your wrist; in this way you should be able to throw a higher throw across and a lower toss back to the throwing hand. It is important to throw this like a reverse cascade--from the outside, thrown over the top--with a flick of the wrist. Although this may be the most difficult of the basic throws with two balls, it is the easiest way (IMHO) to do a basic five-ball multiplex pattern.
Grouped, same height (2 or more balls): The multiplex catch is the hard part here. Try to keep the balls perfectly together as you throw; start low and use all arm/no hand motion.
Basic 3-ball throw: This is the building block for the standard 7-ball multiplex pattern. Two balls return to the throwing hand and one crosses (it qualifies as both grouped and split). I throw this trick like the split/dif. heights multiplex with two--as a reverse cascade throw, though other variations may be possible.
. . . To practice: Work toward the seven-ball multiplex pattern using 4 balls for what would be the 2-ball exchange in learning the 3-ball cascade. Practice throwing the 3-ball group before the single ball, and then the reverse. When you can get a solid exchange, use five balls. Throw a single ball from the hand with two and then the 3-ball multiplex from the other. One hand will be doing the 7-ball multiplex and the other a 3-ball cascade. Switch hands. When both hands can do this 5-ball pattern, try 7.
3-ball start: A single multiplex throw is a flashy way to start a 3-ball juggle. You could split the balls any way you wish. I usually use a triangle with two high, one low. To do this, arrange the balls with one in your palm and two on the fingers. Throw with a hard flick of the wrist to separate the balls as much as possible. Grab the lower ball with a claw, or bat it back up as it comes down so that you will have time to catch the other two and go into a cascade. You can perform the opposite throw--two low and one high--by placing two balls in your palm and one on your fingers. You can add some glitz to the 3-ball start by throwing behind your back, under your leg, etc.
4-ball start: Identical to the 3-ball start, except with 2 balls in the palm and two on the fingers. If you can't go right into the fountain at first, try going into a multiplex pattern.
5-ball start: Place all five balls flat in your hand, with four in your palm (well, close to your palm) and one forming the peak of the "house" shape on your fingertips. I can do this into the standard multiplex pattern, but would like to see it done into a cascade! | {
"redpajama_set_name": "RedPajamaC4"
} | 1,310 | [
128000,
32,
12842,
2635,
2571,
374,
1403,
477,
810,
20953,
15338,
505,
279,
1890,
1450,
520,
279,
1890,
892,
627,
20805,
12842,
2635,
288,
527,
3872,
430,
6493,
20953,
311,
810,
1109,
832,
1450,
13,
320,
59115,
304,
12579,
15082,
11,
420,
3445,
20953,
527,
15338,
505,
264,
3254,
1450,
311,
2225,
6206,
6266,
71703,
649,
387,
15338,
311,
279,
1890,
2673,
477,
2204,
36394,
627,
791,
29862,
527,
28902,
17715,
304,
2015,
315,
7859,
23965,
323,
17250,
13,
1442,
499,
527,
502,
311,
12842,
2635,
288,
11,
6725,
1521,
3872,
304,
279,
2015,
10666,
13,
1102,
1253,
2873,
4382,
311,
6725,
459,
25181,
12842,
2635,
2571,
11,
719,
433,
690,
1520,
499,
3010,
627,
2675,
8965,
1977,
709,
311,
264,
12842,
2635,
5497,
279,
1890,
1648,
499
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
32,
12842,
2635,
2571,
374,
1403,
477,
810,
20953,
15338,
505,
279,
1890,
1450,
520,
279,
1890,
892,
627,
20805,
12842,
2635,
288,
527,
3872,
430,
6493,
20953,
311,
810,
1109,
832,
1450,
13,
320,
59115,
304,
12579,
15082,
11,
420,
3445,
20953,
527,
15338,
505,
264,
3254,
1450,
311,
2225,
6206,
6266,
71703,
649,
387,
15338,
311,
279,
1890,
2673,
477,
2204,
36394,
627,
791,
29862,
527,
28902,
17715,
304,
2015,
315,
7859,
23965,
323,
17250,
13,
1442,
499,
527,
502,
311,
12842,
2635,
288,
11,
6725,
1521,
3872,
304,
279,
2015,
10666,
13,
1102,
1253,
2873,
4382,
311,
6725,
459,
25181,
12842,
2635,
2571,
11,
719,
433,
690,
1520,
499,
3010,
627,
2675,
8965,
1977,
709,
311,
264,
12842,
2635,
5497,
279,
1890,
1648,
499,
-100
] |
About Charlie
The Hunted is Charlie Higson's sixth terrifying installment in the thrilling The Enemy series. The sickness struck everyone over fourteen. First it twisted their minds. Next it ravaged their bodies. Now they roam the streets - Crazed and hungry The others had promised that the countryside would be safer than the city. They were wrong. Now Ella's all-alone except for her silent rescuer, Scarface - and she's not even sure if he's a kid or a grown-up. Back in London, Ed's determined to find her. But getting out of town's never been more dangerous- because coming in the other direction is every SICKO in the country. It's like they're being called towards the capital and nothing is going to stop them...In the penultimate book in The Enemy series, the survivors' stories cross with chilling consequences.
Also available on iTunes
Return to books list
charlie higson @monstroso
On the advice of @petepaphides I'm getting me some. They'd better be bloody good! flare-audio-2.myshopify.com/products/flare…
Privacy Policy | Cookie Policy © All content copyright Charlie Higson 2014 except where noted. Site created by Frequency. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 8,760 | [
128000,
10714,
25972,
198,
791,
27690,
291,
374,
25972,
473,
343,
942,
596,
26084,
42351,
47644,
304,
279,
57399,
578,
31851,
4101,
13,
578,
54950,
17948,
5127,
927,
63360,
13,
5629,
433,
38817,
872,
20663,
13,
9479,
433,
43643,
3359,
872,
13162,
13,
4800,
814,
76067,
279,
14708,
482,
356,
8875,
291,
323,
30056,
578,
3885,
1047,
19487,
430,
279,
47967,
1053,
387,
30549,
1109,
279,
3363,
13,
2435,
1051,
5076,
13,
4800,
78896,
596,
682,
74249,
3734,
369,
1077,
21737,
13208,
8977,
11,
30760,
1594,
482,
323,
1364,
596,
539,
1524,
2771,
422,
568,
596,
264,
10585,
477,
264,
15042,
5352,
13,
6984,
304,
7295,
11,
3279,
596,
11075,
311,
1505,
1077,
13,
2030,
3794,
704,
315,
6424,
596,
2646,
1027,
810,
11660,
12,
1606,
5108,
304
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
10714,
25972,
198,
791,
27690,
291,
374,
25972,
473,
343,
942,
596,
26084,
42351,
47644,
304,
279,
57399,
578,
31851,
4101,
13,
578,
54950,
17948,
5127,
927,
63360,
13,
5629,
433,
38817,
872,
20663,
13,
9479,
433,
43643,
3359,
872,
13162,
13,
4800,
814,
76067,
279,
14708,
482,
356,
8875,
291,
323,
30056,
578,
3885,
1047,
19487,
430,
279,
47967,
1053,
387,
30549,
1109,
279,
3363,
13,
2435,
1051,
5076,
13,
4800,
78896,
596,
682,
74249,
3734,
369,
1077,
21737,
13208,
8977,
11,
30760,
1594,
482,
323,
1364,
596,
539,
1524,
2771,
422,
568,
596,
264,
10585,
477,
264,
15042,
5352,
13,
6984,
304,
7295,
11,
3279,
596,
11075,
311,
1505,
1077,
13,
2030,
3794,
704,
315,
6424,
596,
2646,
1027,
810,
11660,
12,
1606,
5108,
304,
-100
] |
I was very lucky to have been able to read Come Back To Me early but I was a little speechless about it when I first finished, thus the overdue review. I was speechless mostly because I thought Oh crap how the hell do I write a review that does justice to this book– it was that amazing. But then I listened to a certain song and it made me cry because I remembered this book and I knew then I had to share my feelings for this lovely novel to all of you.
Come Back To Me was a fantastically heart-rending novel. It pulls you in entirely and shows you how beautiful love is- and also how painful. Definitely worth reading. I can't wait to read more Mila Gray books!
When it comes to these soundtracks, I usually remember a song while I'm reading a book. This time, I was reminded of a book while listening to a song. I was listening to Taylor Swift's new album and found this gem- it is so perfect for Come Back To Me, I can't even.
I received a review copy of this earlier in the year, but never got round to it. I haven't read since Sunday because I haven't known what to read next, but fter your review? I know exactly what book I'll be starting tonight. Lovely review!
Well, someone had to say how wonderful your book was. ;) Can't wait for more!
i have a copy of this coz my bff insisted i should read this one. so it's on my tbr now. and yeah that song is one of my fave my the 1989 album too. i feel that it is apt for this. great review i have read a lot of great things about this one. let the creyfest begin then. | {
"redpajama_set_name": "RedPajamaC4"
} | 7,881 | [
128000,
40,
574,
1633,
18069,
311,
617,
1027,
3025,
311,
1373,
15936,
6984,
2057,
2206,
4216,
719,
358,
574,
264,
2697,
8982,
1752,
922,
433,
994,
358,
1176,
8220,
11,
8617,
279,
73626,
3477,
13,
358,
574,
8982,
1752,
10213,
1606,
358,
3463,
8840,
36650,
1268,
279,
15123,
656,
358,
3350,
264,
3477,
430,
1587,
12437,
311,
420,
2363,
4235,
433,
574,
430,
8056,
13,
2030,
1243,
358,
34793,
311,
264,
3738,
5609,
323,
433,
1903,
757,
16106,
1606,
358,
27569,
420,
2363,
323,
358,
7020,
1243,
358,
1047,
311,
4430,
856,
16024,
369,
420,
17104,
11775,
311,
682,
315,
499,
627,
29951,
6984,
2057,
2206,
574,
264,
8755,
36419,
4851,
5621,
303,
287,
11775,
13,
1102,
34145,
499,
304,
11622,
323,
5039,
499,
1268,
6366,
3021,
374
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
40,
574,
1633,
18069,
311,
617,
1027,
3025,
311,
1373,
15936,
6984,
2057,
2206,
4216,
719,
358,
574,
264,
2697,
8982,
1752,
922,
433,
994,
358,
1176,
8220,
11,
8617,
279,
73626,
3477,
13,
358,
574,
8982,
1752,
10213,
1606,
358,
3463,
8840,
36650,
1268,
279,
15123,
656,
358,
3350,
264,
3477,
430,
1587,
12437,
311,
420,
2363,
4235,
433,
574,
430,
8056,
13,
2030,
1243,
358,
34793,
311,
264,
3738,
5609,
323,
433,
1903,
757,
16106,
1606,
358,
27569,
420,
2363,
323,
358,
7020,
1243,
358,
1047,
311,
4430,
856,
16024,
369,
420,
17104,
11775,
311,
682,
315,
499,
627,
29951,
6984,
2057,
2206,
574,
264,
8755,
36419,
4851,
5621,
303,
287,
11775,
13,
1102,
34145,
499,
304,
11622,
323,
5039,
499,
1268,
6366,
3021,
374,
-100
] |
Nothing beats a really great massage. The right touch can help your muscles to relax, your circulation to flow more freely, and your emotional state to calm and settle. While the skill of the massouse is probably the most important factor in administering a better than usual massage, your choice in massage products comes in a close second. Natural ingredients are best for creating massage oil blends, salt glow scrubs, and exfoliating ubtans. These are some of our very favorite ingredients – perfect for giving unforgettable massages.
The natural anti-inflammatory properties of Argan Oil make it an excellent ingredient for massage. Argan Oil can help reduce pain and swelling, easing and soothing sore muscles and stiff joints. Use Argan as-is as an intensive care massage oil, or mix it with other ingredients to create massage oil blends and massage bars.
Ginger is naturally warming and stimulating which can help increase blood circulation and induce relaxation. Ginger CO2 Extract can be added to massage oils, bars, and scrubs to aid in relieving soreness and stiffness. The scent of Ginger is also known to have invigorating qualities.
Finely ground chickpeas are combined with almond meal and crushed rose petals to create traditional Indian ubtans. These gentle exfoliants are usually mixed with milk or yogurt, applied as a body mask, then gently massaged away creating an extraordinarily luxurious massage treatment.
The light, pleasant texture of Organic Apricot Kernel Oil makes it a wonderful base for massage oil blends and recipes. This non-greasy Oil is highly moisturizing, and does a great job of carrying Essential Oils, lubricating salt glow scrubs, or being used as-is for everyday massage.
Another excellent ingredient for stimulating circulation, Black Pepper Essential Oil can help reduce pain, alleviate stiffness, and encourage blood flow. Black Pepper Essential Oil may even help reduce pain caused by sprains, sciatica, and arthritis. It can be added to massage oils or solid oil bars for use in massage.
The perfect exfoliant for salt glow massage scrubs, Dead Sea Salt contains a bounty of natural minerals that are believed to possess healing properties suitable for massage. Mineral rich Dead Sea Salt can be used to increase circulation, reduce swelling, and exfoliate dry, dull skin. Add it to solid massage bar scrubs or to traditional salt glow massage scrubs to make use of its precious minerals.
Arnica Extract is a potent anti-inflammatory and pain-reducing ingredient that can do wonders in massage blends and recipes. In our Organic Arnica Oil the extract is carried in Sunflower Oil, making it easy to use in massage oils or in other recipes. Organic Arnica Oil can help ease pain, soothe sore muscles, and even speed the recovery of bruises.
Chamomile is often used as a sedative in aromatherapy. The soothing qualities of Chamomile Essential Oil make it a great addition to relaxing massage oil blends and recipes. It could even be used in a diffuser during massage sessions to promote a sense of quiet and peace.
What are your favorite natural ingredients for massage? | {
"redpajama_set_name": "RedPajamaC4"
} | 5,206 | [
128000,
24714,
34427,
264,
2216,
2294,
6378,
13,
578,
1314,
5916,
649,
1520,
701,
24569,
311,
12234,
11,
701,
35855,
311,
6530,
810,
26662,
11,
323,
701,
14604,
1614,
311,
19858,
323,
25760,
13,
6104,
279,
10151,
315,
279,
3148,
1559,
374,
4762,
279,
1455,
3062,
8331,
304,
86661,
264,
2731,
1109,
13783,
6378,
11,
701,
5873,
304,
6378,
3956,
4131,
304,
264,
3345,
2132,
13,
18955,
14293,
527,
1888,
369,
6968,
6378,
5707,
58943,
11,
12290,
37066,
9406,
16115,
11,
323,
506,
8566,
23747,
18393,
83,
598,
13,
4314,
527,
1063,
315,
1057,
1633,
7075,
14293,
1389,
4832,
369,
7231,
61098,
64279,
627,
791,
5933,
7294,
67595,
6012,
315,
7793,
276,
15895,
1304,
433,
459,
9250,
25795,
369,
6378,
13,
7793,
276,
15895,
649,
1520,
8108,
6784
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
24714,
34427,
264,
2216,
2294,
6378,
13,
578,
1314,
5916,
649,
1520,
701,
24569,
311,
12234,
11,
701,
35855,
311,
6530,
810,
26662,
11,
323,
701,
14604,
1614,
311,
19858,
323,
25760,
13,
6104,
279,
10151,
315,
279,
3148,
1559,
374,
4762,
279,
1455,
3062,
8331,
304,
86661,
264,
2731,
1109,
13783,
6378,
11,
701,
5873,
304,
6378,
3956,
4131,
304,
264,
3345,
2132,
13,
18955,
14293,
527,
1888,
369,
6968,
6378,
5707,
58943,
11,
12290,
37066,
9406,
16115,
11,
323,
506,
8566,
23747,
18393,
83,
598,
13,
4314,
527,
1063,
315,
1057,
1633,
7075,
14293,
1389,
4832,
369,
7231,
61098,
64279,
627,
791,
5933,
7294,
67595,
6012,
315,
7793,
276,
15895,
1304,
433,
459,
9250,
25795,
369,
6378,
13,
7793,
276,
15895,
649,
1520,
8108,
6784,
-100
] |
Whether in a home or a business, an infestation of pests is a significant problem. In commercial premises, the presence of pests can have a devastating effect on the reputation and success of the business, while they pose a threat to the health of any family when they invade a home. Specialising in commercial and domestic removal, our professionals carry out thorough pest control services that will successfully eliminate your unwanted guests.
CONTACT US NOW, in Bradford, West Yorkshire, for a first-class pest control and removal service.
For the complete removal of pests from your property, make sure you turn to pest control professionals. At Copley Pest Solutions UK, in Bradford, West Yorkshire, we provide comprehensive pest removal services for domestic and commercial customers throughout Yorkshire. With many years of experience, and using the most effective techniques, we can deal with all types of pests and insects. To hire our assistance, just give our friendly and helpful team a call. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,438 | [
128000,
25729,
304,
264,
2162,
477,
264,
2626,
11,
459,
4225,
65078,
315,
76056,
374,
264,
5199,
3575,
13,
763,
8518,
35022,
11,
279,
9546,
315,
76056,
649,
617,
264,
33318,
2515,
389,
279,
17444,
323,
2450,
315,
279,
2626,
11,
1418,
814,
17477,
264,
6023,
311,
279,
2890,
315,
904,
3070,
994,
814,
75272,
264,
2162,
13,
9984,
3876,
304,
8518,
323,
13018,
17065,
11,
1057,
15749,
6920,
704,
17879,
44885,
2585,
3600,
430,
690,
7946,
22472,
701,
36021,
15051,
627,
74471,
2326,
23214,
11,
304,
60929,
11,
4410,
51327,
11,
369,
264,
1176,
15144,
44885,
2585,
323,
17065,
2532,
627,
2520,
279,
4686,
17065,
315,
76056,
505,
701,
3424,
11,
1304,
2771,
499,
2543,
311,
44885,
2585,
15749,
13,
2468,
356,
1184,
88,
89245,
23508,
6560
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
25729,
304,
264,
2162,
477,
264,
2626,
11,
459,
4225,
65078,
315,
76056,
374,
264,
5199,
3575,
13,
763,
8518,
35022,
11,
279,
9546,
315,
76056,
649,
617,
264,
33318,
2515,
389,
279,
17444,
323,
2450,
315,
279,
2626,
11,
1418,
814,
17477,
264,
6023,
311,
279,
2890,
315,
904,
3070,
994,
814,
75272,
264,
2162,
13,
9984,
3876,
304,
8518,
323,
13018,
17065,
11,
1057,
15749,
6920,
704,
17879,
44885,
2585,
3600,
430,
690,
7946,
22472,
701,
36021,
15051,
627,
74471,
2326,
23214,
11,
304,
60929,
11,
4410,
51327,
11,
369,
264,
1176,
15144,
44885,
2585,
323,
17065,
2532,
627,
2520,
279,
4686,
17065,
315,
76056,
505,
701,
3424,
11,
1304,
2771,
499,
2543,
311,
44885,
2585,
15749,
13,
2468,
356,
1184,
88,
89245,
23508,
6560,
-100
] |
Tailored Brands Taps Neiman's Richardson for CFO Role
Jean E. Palmieri
19 October 2021, 4:49 pm ·2-min read
Tailored Brands has named Brandy Richardson its chief financial officer, effective Nov. 8.
The men's tailored clothing retailer has kept a low profile since its chief executive officer, Dinesh Lahti, and chief merchant, Carrie Ask, left the firm in March, three months after it emerged from bankruptcy. The company brought veteran Peter Sachse on board as interim co-CEO at that time, sharing those duties with former Lowe's CFO Bob Hull. John Tighe, who had worked for J.C. Penney Co. Inc. and Peerless Clothing, was brought on board as chief customer officer.
More from WWD
6 Headlines that Captivated the Retail Industry in 2019
CEO Talks: Michael Kliger, president, mytheresa.com
Neiman Marcus Beverly Hills Completes Major Remodel
Richardson has more than 20 years of experience in finance, business transformation, strategic planning and execution, capital allocation and investor relations. She most recently served as executive vice president and CFO of Neiman Marcus Group, where she played a pivotal role in the company's Chapter 11 restructuring and helped refinance the exit debt facilities. At Tailored Brands, she will serve on the company's executive committee and have responsibility for all aspects of finance as well as real estate and loss prevention.
"Brandy joins us at a time when we are well-positioned to accelerate our business strategies, delivering for our customers and positioning each of our brands — and the teams that support them — for long-term success," said Hull. "Brandy brings a wealth of knowledge and experience in managing a portfolio of companies, increasing liquidity, improving capital allocation and driving value creation. Our leadership team and board of directors are confident that her forward-thinking leadership is the right fit at the right time."
Sachse added: "The experience Brandy brings from her roles in strategy and finance will provide a comprehensive perspective as we continue to navigate the ever-changing retail environment and show up strong for our customers in all the moments that matter. We are excited to have Brandy join our leadership team as we determine innovative ways to execute against our strategic priorities and further our success."
Prior to joining Neiman Marcus Group, Richardson was with Cardinal Health, a medical equipment manufacturer, and Ernst & Young LLP.
Tailored Brands filed Chapter 11 in August of 2020. It emerged from bankruptcy in December with $678 million less in debt, 500 fewer stores, a $430 million asset-based loan facility, a $365 million exit-term loan and $75 million of cash from a new debt facility.
However, in early March, the company said it needed an additional $75 million in order to keep operating. Tailored Brands secured that sum — which consists of $50 million of mandatorily convertible notes and $25 million in additional senior secured debt — from Silver Point Capital LP, one of its existing lenders and its largest equity holder.
Sign up for WWD's Newsletter. For the latest news, follow us on Twitter, Facebook, and Instagram.
Yahoo Finance Singapore
Money Choice: What an award-winning company did when business failed
When the profits dropped, the 47-year-old founder of Apostrophe Films pivoted from producing traditional films and advertisements to focusing on the online and digital space.
Malaysia welcomes a new DJI Experience Store Premium
New Store Premium and first Service Centre now open at One Utama.KUALA LUMPUR, MALAYSIA - Media OutReach - 19 January 2022 - DJI, is a global leader in developing and manufacturing civilian drones and creative camera technology for personal and professional use, has launched its newest DJI Experience Store Premium and Service Centre at One Utama Shopping Mall, Petaling Jaya. Following the recent launch of its first DJI Experience Store Premium in Pavilion Kuala Lumpur, the one-stop centre offers
A Sea of Red in the NASDAQ: 4 Stocks Primed for Growth
In a period of market volatility, these companies could prove to be bargains in the long term. The post A Sea of Red in the NASDAQ: 4 Stocks Primed for Growth appeared first on The Smart Investor.
Gloria Mansion sold en bloc for $70.3 mil to Fraxtor Capital and group led by Teo family
Gloria Mansion has been sold to Fraxtor Capital and a group led by the Teo family of Tong Eng GroupSINGAPORE (EDGEPROP) - Gloria Mansion has been sold en bloc for $70.3 million to Fraxtor Capital and a group led by the family offices of Daniel Teo and his brother Teo Teck Weng, from the Teo family of Tong Eng Group. (See potential condos with en bloc calculator)The brothers also started Hong How Group, where Daniel serves as chairman and managing director. He also serves as an investment adviser | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 761 | [
128000,
45895,
3093,
55332,
350,
2690,
4275,
40310,
596,
46823,
369,
94852,
15766,
198,
69009,
469,
13,
33578,
55039,
198,
777,
6664,
220,
2366,
16,
11,
220,
19,
25,
2491,
9012,
9787,
17,
13703,
1373,
198,
45895,
3093,
55332,
706,
7086,
3320,
13634,
46823,
1202,
10388,
6020,
9640,
11,
7524,
4723,
13,
220,
23,
627,
791,
3026,
596,
41891,
17895,
37891,
706,
8774,
264,
3428,
5643,
2533,
1202,
10388,
11145,
9640,
11,
423,
1572,
71,
5034,
95948,
11,
323,
10388,
30338,
11,
65551,
21069,
11,
2163,
279,
7626,
304,
5587,
11,
2380,
4038,
1306,
433,
22763,
505,
36707,
13,
578,
2883,
7263,
21487,
11291,
38437,
325,
389,
4580,
439,
41653,
1080,
12,
79596,
520,
430,
892,
11,
11821,
1884,
22006,
449,
4846,
65687,
596,
94852,
14596,
58486,
13
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
45895,
3093,
55332,
350,
2690,
4275,
40310,
596,
46823,
369,
94852,
15766,
198,
69009,
469,
13,
33578,
55039,
198,
777,
6664,
220,
2366,
16,
11,
220,
19,
25,
2491,
9012,
9787,
17,
13703,
1373,
198,
45895,
3093,
55332,
706,
7086,
3320,
13634,
46823,
1202,
10388,
6020,
9640,
11,
7524,
4723,
13,
220,
23,
627,
791,
3026,
596,
41891,
17895,
37891,
706,
8774,
264,
3428,
5643,
2533,
1202,
10388,
11145,
9640,
11,
423,
1572,
71,
5034,
95948,
11,
323,
10388,
30338,
11,
65551,
21069,
11,
2163,
279,
7626,
304,
5587,
11,
2380,
4038,
1306,
433,
22763,
505,
36707,
13,
578,
2883,
7263,
21487,
11291,
38437,
325,
389,
4580,
439,
41653,
1080,
12,
79596,
520,
430,
892,
11,
11821,
1884,
22006,
449,
4846,
65687,
596,
94852,
14596,
58486,
13,
-100
] |
module Aws::AppStream
module Types
# Describes an application in the application catalog.
#
# @!attribute [rw] name
# The name of the application.
# @return [String]
#
# @!attribute [rw] display_name
# The application name for display.
# @return [String]
#
# @!attribute [rw] icon_url
# The URL for the application icon. This URL might be time-limited.
# @return [String]
#
# @!attribute [rw] launch_path
# The path to the application executable in the instance.
# @return [String]
#
# @!attribute [rw] launch_parameters
# The arguments that are passed to the application at launch.
# @return [String]
#
# @!attribute [rw] enabled
# If there is a problem, the application can be disabled after image
# creation.
# @return [Boolean]
#
# @!attribute [rw] metadata
# Additional attributes that describe the application.
# @return [Hash<String,String>]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/Application AWS API Documentation
#
class Application < Struct.new(
:name,
:display_name,
:icon_url,
:launch_path,
:launch_parameters,
:enabled,
:metadata)
include Aws::Structure
end
# @note When making an API call, you may pass AssociateFleetRequest
# data as a hash:
#
# {
# fleet_name: "String", # required
# stack_name: "String", # required
# }
#
# @!attribute [rw] fleet_name
# The name of the fleet.
# @return [String]
#
# @!attribute [rw] stack_name
# The name of the stack.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/AssociateFleetRequest AWS API Documentation
#
class AssociateFleetRequest < Struct.new(
:fleet_name,
:stack_name)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/AssociateFleetResult AWS API Documentation
#
class AssociateFleetResult < Aws::EmptyStructure; end
# Describes the capacity for a fleet.
#
# @note When making an API call, you may pass ComputeCapacity
# data as a hash:
#
# {
# desired_instances: 1, # required
# }
#
# @!attribute [rw] desired_instances
# The desired number of streaming instances.
# @return [Integer]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ComputeCapacity AWS API Documentation
#
class ComputeCapacity < Struct.new(
:desired_instances)
include Aws::Structure
end
# Describes the capacity status for a fleet.
#
# @!attribute [rw] desired
# The desired number of streaming instances.
# @return [Integer]
#
# @!attribute [rw] running
# The total number of simultaneous streaming instances that are
# running.
# @return [Integer]
#
# @!attribute [rw] in_use
# The number of instances in use for streaming.
# @return [Integer]
#
# @!attribute [rw] available
# The number of currently available instances that can be used to
# stream sessions.
# @return [Integer]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ComputeCapacityStatus AWS API Documentation
#
class ComputeCapacityStatus < Struct.new(
:desired,
:running,
:in_use,
:available)
include Aws::Structure
end
# @note When making an API call, you may pass CopyImageRequest
# data as a hash:
#
# {
# source_image_name: "Name", # required
# destination_image_name: "Name", # required
# destination_region: "RegionName", # required
# destination_image_description: "Description",
# }
#
# @!attribute [rw] source_image_name
# The name of the image to copy.
# @return [String]
#
# @!attribute [rw] destination_image_name
# The name that the image will have when it is copied to the
# destination.
# @return [String]
#
# @!attribute [rw] destination_region
# The destination region to which the image will be copied. This
# parameter is required, even if you are copying an image within the
# same region.
# @return [String]
#
# @!attribute [rw] destination_image_description
# The description that the image will have when it is copied to the
# destination.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CopyImageRequest AWS API Documentation
#
class CopyImageRequest < Struct.new(
:source_image_name,
:destination_image_name,
:destination_region,
:destination_image_description)
include Aws::Structure
end
# @!attribute [rw] destination_image_name
# The name of the destination image.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CopyImageResponse AWS API Documentation
#
class CopyImageResponse < Struct.new(
:destination_image_name)
include Aws::Structure
end
# @note When making an API call, you may pass CreateDirectoryConfigRequest
# data as a hash:
#
# {
# directory_name: "DirectoryName", # required
# organizational_unit_distinguished_names: ["OrganizationalUnitDistinguishedName"], # required
# service_account_credentials: { # required
# account_name: "AccountName", # required
# account_password: "AccountPassword", # required
# },
# }
#
# @!attribute [rw] directory_name
# The fully qualified name of the directory (for example,
# corp.example.com).
# @return [String]
#
# @!attribute [rw] organizational_unit_distinguished_names
# The distinguished names of the organizational units for computer
# accounts.
# @return [Array<String>]
#
# @!attribute [rw] service_account_credentials
# The credentials for the service account used by the streaming
# instance to connect to the directory.
# @return [Types::ServiceAccountCredentials]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateDirectoryConfigRequest AWS API Documentation
#
class CreateDirectoryConfigRequest < Struct.new(
:directory_name,
:organizational_unit_distinguished_names,
:service_account_credentials)
include Aws::Structure
end
# @!attribute [rw] directory_config
# Information about the directory configuration.
# @return [Types::DirectoryConfig]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateDirectoryConfigResult AWS API Documentation
#
class CreateDirectoryConfigResult < Struct.new(
:directory_config)
include Aws::Structure
end
# @note When making an API call, you may pass CreateFleetRequest
# data as a hash:
#
# {
# name: "Name", # required
# image_name: "String",
# image_arn: "Arn",
# instance_type: "String", # required
# fleet_type: "ALWAYS_ON", # accepts ALWAYS_ON, ON_DEMAND
# compute_capacity: { # required
# desired_instances: 1, # required
# },
# vpc_config: {
# subnet_ids: ["String"],
# security_group_ids: ["String"],
# },
# max_user_duration_in_seconds: 1,
# disconnect_timeout_in_seconds: 1,
# description: "Description",
# display_name: "DisplayName",
# enable_default_internet_access: false,
# domain_join_info: {
# directory_name: "DirectoryName",
# organizational_unit_distinguished_name: "OrganizationalUnitDistinguishedName",
# },
# }
#
# @!attribute [rw] name
# A unique name for the fleet.
# @return [String]
#
# @!attribute [rw] image_name
# The name of the image used to create the fleet.
# @return [String]
#
# @!attribute [rw] image_arn
# The ARN of the public, private, or shared image to use.
# @return [String]
#
# @!attribute [rw] instance_type
# The instance type to use when launching fleet instances. The
# following instance types are available:
#
# * stream.standard.medium
#
# * stream.standard.large
#
# * stream.compute.large
#
# * stream.compute.xlarge
#
# * stream.compute.2xlarge
#
# * stream.compute.4xlarge
#
# * stream.compute.8xlarge
#
# * stream.memory.large
#
# * stream.memory.xlarge
#
# * stream.memory.2xlarge
#
# * stream.memory.4xlarge
#
# * stream.memory.8xlarge
#
# * stream.graphics-design.large
#
# * stream.graphics-design.xlarge
#
# * stream.graphics-design.2xlarge
#
# * stream.graphics-design.4xlarge
#
# * stream.graphics-desktop.2xlarge
#
# * stream.graphics-pro.4xlarge
#
# * stream.graphics-pro.8xlarge
#
# * stream.graphics-pro.16xlarge
# @return [String]
#
# @!attribute [rw] fleet_type
# The fleet type.
#
# ALWAYS\_ON
#
# : Provides users with instant-on access to their apps. You are
# charged for all running instances in your fleet, even if no users
# are streaming apps.
#
# ON\_DEMAND
#
# : Provide users with access to applications after they connect,
# which takes one to two minutes. You are charged for instance
# streaming when users are connected and a small hourly fee for
# instances that are not streaming apps.
# @return [String]
#
# @!attribute [rw] compute_capacity
# The desired capacity for the fleet.
# @return [Types::ComputeCapacity]
#
# @!attribute [rw] vpc_config
# The VPC configuration for the fleet.
# @return [Types::VpcConfig]
#
# @!attribute [rw] max_user_duration_in_seconds
# The maximum time that a streaming session can run, in seconds.
# Specify a value between 600 and 57600.
# @return [Integer]
#
# @!attribute [rw] disconnect_timeout_in_seconds
# The time after disconnection when a session is considered to have
# ended, in seconds. If a user who was disconnected reconnects within
# this time interval, the user is connected to their previous session.
# Specify a value between 60 and 57600.
# @return [Integer]
#
# @!attribute [rw] description
# The description for display.
# @return [String]
#
# @!attribute [rw] display_name
# The fleet name for display.
# @return [String]
#
# @!attribute [rw] enable_default_internet_access
# Enables or disables default internet access for the fleet.
# @return [Boolean]
#
# @!attribute [rw] domain_join_info
# The information needed to join a Microsoft Active Directory domain.
# @return [Types::DomainJoinInfo]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateFleetRequest AWS API Documentation
#
class CreateFleetRequest < Struct.new(
:name,
:image_name,
:image_arn,
:instance_type,
:fleet_type,
:compute_capacity,
:vpc_config,
:max_user_duration_in_seconds,
:disconnect_timeout_in_seconds,
:description,
:display_name,
:enable_default_internet_access,
:domain_join_info)
include Aws::Structure
end
# @!attribute [rw] fleet
# Information about the fleet.
# @return [Types::Fleet]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateFleetResult AWS API Documentation
#
class CreateFleetResult < Struct.new(
:fleet)
include Aws::Structure
end
# @note When making an API call, you may pass CreateImageBuilderRequest
# data as a hash:
#
# {
# name: "Name", # required
# image_name: "String",
# image_arn: "Arn",
# instance_type: "String", # required
# description: "Description",
# display_name: "DisplayName",
# vpc_config: {
# subnet_ids: ["String"],
# security_group_ids: ["String"],
# },
# enable_default_internet_access: false,
# domain_join_info: {
# directory_name: "DirectoryName",
# organizational_unit_distinguished_name: "OrganizationalUnitDistinguishedName",
# },
# appstream_agent_version: "AppstreamAgentVersion",
# }
#
# @!attribute [rw] name
# A unique name for the image builder.
# @return [String]
#
# @!attribute [rw] image_name
# The name of the image used to create the builder.
# @return [String]
#
# @!attribute [rw] image_arn
# The ARN of the public, private, or shared image to use.
# @return [String]
#
# @!attribute [rw] instance_type
# The instance type to use when launching the image builder.
# @return [String]
#
# @!attribute [rw] description
# The description for display.
# @return [String]
#
# @!attribute [rw] display_name
# The image builder name for display.
# @return [String]
#
# @!attribute [rw] vpc_config
# The VPC configuration for the image builder. You can specify only
# one subnet.
# @return [Types::VpcConfig]
#
# @!attribute [rw] enable_default_internet_access
# Enables or disables default internet access for the image builder.
# @return [Boolean]
#
# @!attribute [rw] domain_join_info
# The information needed to join a Microsoft Active Directory domain.
# @return [Types::DomainJoinInfo]
#
# @!attribute [rw] appstream_agent_version
# The version of the AppStream 2.0 agent to use for this image
# builder. To use the latest version of the AppStream 2.0 agent,
# specify \[LATEST\].
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateImageBuilderRequest AWS API Documentation
#
class CreateImageBuilderRequest < Struct.new(
:name,
:image_name,
:image_arn,
:instance_type,
:description,
:display_name,
:vpc_config,
:enable_default_internet_access,
:domain_join_info,
:appstream_agent_version)
include Aws::Structure
end
# @!attribute [rw] image_builder
# Information about the image builder.
# @return [Types::ImageBuilder]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateImageBuilderResult AWS API Documentation
#
class CreateImageBuilderResult < Struct.new(
:image_builder)
include Aws::Structure
end
# @note When making an API call, you may pass CreateImageBuilderStreamingURLRequest
# data as a hash:
#
# {
# name: "String", # required
# validity: 1,
# }
#
# @!attribute [rw] name
# The name of the image builder.
# @return [String]
#
# @!attribute [rw] validity
# The time that the streaming URL will be valid, in seconds. Specify a
# value between 1 and 604800 seconds. The default is 3600 seconds.
# @return [Integer]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateImageBuilderStreamingURLRequest AWS API Documentation
#
class CreateImageBuilderStreamingURLRequest < Struct.new(
:name,
:validity)
include Aws::Structure
end
# @!attribute [rw] streaming_url
# The URL to start the AppStream 2.0 streaming session.
# @return [String]
#
# @!attribute [rw] expires
# The elapsed time, in seconds after the Unix epoch, when this URL
# expires.
# @return [Time]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateImageBuilderStreamingURLResult AWS API Documentation
#
class CreateImageBuilderStreamingURLResult < Struct.new(
:streaming_url,
:expires)
include Aws::Structure
end
# @note When making an API call, you may pass CreateStackRequest
# data as a hash:
#
# {
# name: "Name", # required
# description: "Description",
# display_name: "DisplayName",
# storage_connectors: [
# {
# connector_type: "HOMEFOLDERS", # required, accepts HOMEFOLDERS, GOOGLE_DRIVE, ONE_DRIVE
# resource_identifier: "ResourceIdentifier",
# domains: ["Domain"],
# },
# ],
# redirect_url: "RedirectURL",
# feedback_url: "FeedbackURL",
# user_settings: [
# {
# action: "CLIPBOARD_COPY_FROM_LOCAL_DEVICE", # required, accepts CLIPBOARD_COPY_FROM_LOCAL_DEVICE, CLIPBOARD_COPY_TO_LOCAL_DEVICE, FILE_UPLOAD, FILE_DOWNLOAD, PRINTING_TO_LOCAL_DEVICE
# permission: "ENABLED", # required, accepts ENABLED, DISABLED
# },
# ],
# }
#
# @!attribute [rw] name
# The name of the stack.
# @return [String]
#
# @!attribute [rw] description
# The description for display.
# @return [String]
#
# @!attribute [rw] display_name
# The stack name for display.
# @return [String]
#
# @!attribute [rw] storage_connectors
# The storage connectors to enable.
# @return [Array<Types::StorageConnector>]
#
# @!attribute [rw] redirect_url
# The URL that users are redirected to after their streaming session
# ends.
# @return [String]
#
# @!attribute [rw] feedback_url
# The URL that users are redirected to after they click the Send
# Feedback link. If no URL is specified, no Send Feedback link is
# displayed.
# @return [String]
#
# @!attribute [rw] user_settings
# The actions that are enabled or disabled for users during their
# streaming sessions. By default, these actions are enabled.
# @return [Array<Types::UserSetting>]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateStackRequest AWS API Documentation
#
class CreateStackRequest < Struct.new(
:name,
:description,
:display_name,
:storage_connectors,
:redirect_url,
:feedback_url,
:user_settings)
include Aws::Structure
end
# @!attribute [rw] stack
# Information about the stack.
# @return [Types::Stack]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateStackResult AWS API Documentation
#
class CreateStackResult < Struct.new(
:stack)
include Aws::Structure
end
# @note When making an API call, you may pass CreateStreamingURLRequest
# data as a hash:
#
# {
# stack_name: "String", # required
# fleet_name: "String", # required
# user_id: "StreamingUrlUserId", # required
# application_id: "String",
# validity: 1,
# session_context: "String",
# }
#
# @!attribute [rw] stack_name
# The name of the stack.
# @return [String]
#
# @!attribute [rw] fleet_name
# The name of the fleet.
# @return [String]
#
# @!attribute [rw] user_id
# The ID of the user.
# @return [String]
#
# @!attribute [rw] application_id
# The name of the application to launch after the session starts. This
# is the name that you specified as **Name** in the Image Assistant.
# @return [String]
#
# @!attribute [rw] validity
# The time that the streaming URL will be valid, in seconds. Specify a
# value between 1 and 604800 seconds. The default is 60 seconds.
# @return [Integer]
#
# @!attribute [rw] session_context
# The session context. For more information, see [Session Context][1]
# in the *Amazon AppStream 2.0 Developer Guide*.
#
#
#
# [1]: http://docs.aws.amazon.com/appstream2/latest/developerguide/managing-stacks-fleets.html#managing-stacks-fleets-parameters
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateStreamingURLRequest AWS API Documentation
#
class CreateStreamingURLRequest < Struct.new(
:stack_name,
:fleet_name,
:user_id,
:application_id,
:validity,
:session_context)
include Aws::Structure
end
# @!attribute [rw] streaming_url
# The URL to start the AppStream 2.0 streaming session.
# @return [String]
#
# @!attribute [rw] expires
# The elapsed time, in seconds after the Unix epoch, when this URL
# expires.
# @return [Time]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/CreateStreamingURLResult AWS API Documentation
#
class CreateStreamingURLResult < Struct.new(
:streaming_url,
:expires)
include Aws::Structure
end
# @note When making an API call, you may pass DeleteDirectoryConfigRequest
# data as a hash:
#
# {
# directory_name: "DirectoryName", # required
# }
#
# @!attribute [rw] directory_name
# The name of the directory configuration.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteDirectoryConfigRequest AWS API Documentation
#
class DeleteDirectoryConfigRequest < Struct.new(
:directory_name)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteDirectoryConfigResult AWS API Documentation
#
class DeleteDirectoryConfigResult < Aws::EmptyStructure; end
# @note When making an API call, you may pass DeleteFleetRequest
# data as a hash:
#
# {
# name: "String", # required
# }
#
# @!attribute [rw] name
# The name of the fleet.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteFleetRequest AWS API Documentation
#
class DeleteFleetRequest < Struct.new(
:name)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteFleetResult AWS API Documentation
#
class DeleteFleetResult < Aws::EmptyStructure; end
# @note When making an API call, you may pass DeleteImageBuilderRequest
# data as a hash:
#
# {
# name: "Name", # required
# }
#
# @!attribute [rw] name
# The name of the image builder.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteImageBuilderRequest AWS API Documentation
#
class DeleteImageBuilderRequest < Struct.new(
:name)
include Aws::Structure
end
# @!attribute [rw] image_builder
# Information about the image builder.
# @return [Types::ImageBuilder]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteImageBuilderResult AWS API Documentation
#
class DeleteImageBuilderResult < Struct.new(
:image_builder)
include Aws::Structure
end
# @note When making an API call, you may pass DeleteImagePermissionsRequest
# data as a hash:
#
# {
# name: "Name", # required
# shared_account_id: "AwsAccountId", # required
# }
#
# @!attribute [rw] name
# The name of the private image.
# @return [String]
#
# @!attribute [rw] shared_account_id
# The 12-digit ID of the AWS account for which to delete image
# permissions.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteImagePermissionsRequest AWS API Documentation
#
class DeleteImagePermissionsRequest < Struct.new(
:name,
:shared_account_id)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteImagePermissionsResult AWS API Documentation
#
class DeleteImagePermissionsResult < Aws::EmptyStructure; end
# @note When making an API call, you may pass DeleteImageRequest
# data as a hash:
#
# {
# name: "Name", # required
# }
#
# @!attribute [rw] name
# The name of the image.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteImageRequest AWS API Documentation
#
class DeleteImageRequest < Struct.new(
:name)
include Aws::Structure
end
# @!attribute [rw] image
# Information about the image.
# @return [Types::Image]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteImageResult AWS API Documentation
#
class DeleteImageResult < Struct.new(
:image)
include Aws::Structure
end
# @note When making an API call, you may pass DeleteStackRequest
# data as a hash:
#
# {
# name: "String", # required
# }
#
# @!attribute [rw] name
# The name of the stack.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteStackRequest AWS API Documentation
#
class DeleteStackRequest < Struct.new(
:name)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DeleteStackResult AWS API Documentation
#
class DeleteStackResult < Aws::EmptyStructure; end
# @note When making an API call, you may pass DescribeDirectoryConfigsRequest
# data as a hash:
#
# {
# directory_names: ["DirectoryName"],
# max_results: 1,
# next_token: "String",
# }
#
# @!attribute [rw] directory_names
# The directory names.
# @return [Array<String>]
#
# @!attribute [rw] max_results
# The maximum size of each page of results.
# @return [Integer]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If this value is null, it retrieves the first page.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeDirectoryConfigsRequest AWS API Documentation
#
class DescribeDirectoryConfigsRequest < Struct.new(
:directory_names,
:max_results,
:next_token)
include Aws::Structure
end
# @!attribute [rw] directory_configs
# Information about the directory configurations. Note that although
# the response syntax in this topic includes the account password,
# this password is not returned in the actual response.
# @return [Array<Types::DirectoryConfig>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If there are no more pages, this value is null.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeDirectoryConfigsResult AWS API Documentation
#
class DescribeDirectoryConfigsResult < Struct.new(
:directory_configs,
:next_token)
include Aws::Structure
end
# @note When making an API call, you may pass DescribeFleetsRequest
# data as a hash:
#
# {
# names: ["String"],
# next_token: "String",
# }
#
# @!attribute [rw] names
# The names of the fleets to describe.
# @return [Array<String>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If this value is null, it retrieves the first page.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeFleetsRequest AWS API Documentation
#
class DescribeFleetsRequest < Struct.new(
:names,
:next_token)
include Aws::Structure
end
# @!attribute [rw] fleets
# Information about the fleets.
# @return [Array<Types::Fleet>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If there are no more pages, this value is null.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeFleetsResult AWS API Documentation
#
class DescribeFleetsResult < Struct.new(
:fleets,
:next_token)
include Aws::Structure
end
# @note When making an API call, you may pass DescribeImageBuildersRequest
# data as a hash:
#
# {
# names: ["String"],
# max_results: 1,
# next_token: "String",
# }
#
# @!attribute [rw] names
# The names of the image builders to describe.
# @return [Array<String>]
#
# @!attribute [rw] max_results
# The maximum size of each page of results.
# @return [Integer]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If this value is null, it retrieves the first page.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeImageBuildersRequest AWS API Documentation
#
class DescribeImageBuildersRequest < Struct.new(
:names,
:max_results,
:next_token)
include Aws::Structure
end
# @!attribute [rw] image_builders
# Information about the image builders.
# @return [Array<Types::ImageBuilder>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If there are no more pages, this value is null.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeImageBuildersResult AWS API Documentation
#
class DescribeImageBuildersResult < Struct.new(
:image_builders,
:next_token)
include Aws::Structure
end
# @note When making an API call, you may pass DescribeImagePermissionsRequest
# data as a hash:
#
# {
# name: "Name", # required
# max_results: 1,
# shared_aws_account_ids: ["AwsAccountId"],
# next_token: "String",
# }
#
# @!attribute [rw] name
# The name of the private image for which to describe permissions. The
# image must be one that you own.
# @return [String]
#
# @!attribute [rw] max_results
# The maximum size of each results page.
# @return [Integer]
#
# @!attribute [rw] shared_aws_account_ids
# The 12-digit ID of one or more AWS accounts with which the image is
# shared.
# @return [Array<String>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results. If
# this value is empty, only the first page is retrieved.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeImagePermissionsRequest AWS API Documentation
#
class DescribeImagePermissionsRequest < Struct.new(
:name,
:max_results,
:shared_aws_account_ids,
:next_token)
include Aws::Structure
end
# @!attribute [rw] name
# The name of the private image.
# @return [String]
#
# @!attribute [rw] shared_image_permissions_list
# The permissions for a private image that you own.
# @return [Array<Types::SharedImagePermissions>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results. If
# this value is empty, only the first page is retrieved.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeImagePermissionsResult AWS API Documentation
#
class DescribeImagePermissionsResult < Struct.new(
:name,
:shared_image_permissions_list,
:next_token)
include Aws::Structure
end
# @note When making an API call, you may pass DescribeImagesRequest
# data as a hash:
#
# {
# names: ["String"],
# arns: ["Arn"],
# type: "PUBLIC", # accepts PUBLIC, PRIVATE, SHARED
# next_token: "String",
# max_results: 1,
# }
#
# @!attribute [rw] names
# The names of the images to describe.
# @return [Array<String>]
#
# @!attribute [rw] arns
# The ARNs of the public, private, and shared images to describe.
# @return [Array<String>]
#
# @!attribute [rw] type
# The type of image (public, private, or shared) to describe.
# @return [String]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results. If
# this value is empty, only the first page is retrieved.
# @return [String]
#
# @!attribute [rw] max_results
# The maximum size of each page of results.
# @return [Integer]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeImagesRequest AWS API Documentation
#
class DescribeImagesRequest < Struct.new(
:names,
:arns,
:type,
:next_token,
:max_results)
include Aws::Structure
end
# @!attribute [rw] images
# Information about the images.
# @return [Array<Types::Image>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results. If
# there are no more pages, this value is null.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeImagesResult AWS API Documentation
#
class DescribeImagesResult < Struct.new(
:images,
:next_token)
include Aws::Structure
end
# @note When making an API call, you may pass DescribeSessionsRequest
# data as a hash:
#
# {
# stack_name: "String", # required
# fleet_name: "String", # required
# user_id: "UserId",
# next_token: "String",
# limit: 1,
# authentication_type: "API", # accepts API, SAML, USERPOOL
# }
#
# @!attribute [rw] stack_name
# The name of the stack. This value is case-sensitive.
# @return [String]
#
# @!attribute [rw] fleet_name
# The name of the fleet. This value is case-sensitive.
# @return [String]
#
# @!attribute [rw] user_id
# The user ID.
# @return [String]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If this value is null, it retrieves the first page.
# @return [String]
#
# @!attribute [rw] limit
# The size of each page of results. The default value is 20 and the
# maximum value is 50.
# @return [Integer]
#
# @!attribute [rw] authentication_type
# The authentication method. Specify `API` for a user authenticated
# using a streaming URL or `SAML` for a SAML federated user. The
# default is to authenticate users using a streaming URL.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeSessionsRequest AWS API Documentation
#
class DescribeSessionsRequest < Struct.new(
:stack_name,
:fleet_name,
:user_id,
:next_token,
:limit,
:authentication_type)
include Aws::Structure
end
# @!attribute [rw] sessions
# Information about the streaming sessions.
# @return [Array<Types::Session>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If there are no more pages, this value is null.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeSessionsResult AWS API Documentation
#
class DescribeSessionsResult < Struct.new(
:sessions,
:next_token)
include Aws::Structure
end
# @note When making an API call, you may pass DescribeStacksRequest
# data as a hash:
#
# {
# names: ["String"],
# next_token: "String",
# }
#
# @!attribute [rw] names
# The names of the stacks to describe.
# @return [Array<String>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If this value is null, it retrieves the first page.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeStacksRequest AWS API Documentation
#
class DescribeStacksRequest < Struct.new(
:names,
:next_token)
include Aws::Structure
end
# @!attribute [rw] stacks
# Information about the stacks.
# @return [Array<Types::Stack>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If there are no more pages, this value is null.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DescribeStacksResult AWS API Documentation
#
class DescribeStacksResult < Struct.new(
:stacks,
:next_token)
include Aws::Structure
end
# Configuration information for the directory used to join domains.
#
# @!attribute [rw] directory_name
# The fully qualified name of the directory (for example,
# corp.example.com).
# @return [String]
#
# @!attribute [rw] organizational_unit_distinguished_names
# The distinguished names of the organizational units for computer
# accounts.
# @return [Array<String>]
#
# @!attribute [rw] service_account_credentials
# The credentials for the service account used by the streaming
# instance to connect to the directory.
# @return [Types::ServiceAccountCredentials]
#
# @!attribute [rw] created_time
# The time the directory configuration was created.
# @return [Time]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DirectoryConfig AWS API Documentation
#
class DirectoryConfig < Struct.new(
:directory_name,
:organizational_unit_distinguished_names,
:service_account_credentials,
:created_time)
include Aws::Structure
end
# @note When making an API call, you may pass DisassociateFleetRequest
# data as a hash:
#
# {
# fleet_name: "String", # required
# stack_name: "String", # required
# }
#
# @!attribute [rw] fleet_name
# The name of the fleet.
# @return [String]
#
# @!attribute [rw] stack_name
# The name of the stack.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DisassociateFleetRequest AWS API Documentation
#
class DisassociateFleetRequest < Struct.new(
:fleet_name,
:stack_name)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DisassociateFleetResult AWS API Documentation
#
class DisassociateFleetResult < Aws::EmptyStructure; end
# Contains the information needed to join a Microsoft Active Directory
# domain.
#
# @note When making an API call, you may pass DomainJoinInfo
# data as a hash:
#
# {
# directory_name: "DirectoryName",
# organizational_unit_distinguished_name: "OrganizationalUnitDistinguishedName",
# }
#
# @!attribute [rw] directory_name
# The fully qualified name of the directory (for example,
# corp.example.com).
# @return [String]
#
# @!attribute [rw] organizational_unit_distinguished_name
# The distinguished name of the organizational unit for computer
# accounts.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/DomainJoinInfo AWS API Documentation
#
class DomainJoinInfo < Struct.new(
:directory_name,
:organizational_unit_distinguished_name)
include Aws::Structure
end
# @note When making an API call, you may pass ExpireSessionRequest
# data as a hash:
#
# {
# session_id: "String", # required
# }
#
# @!attribute [rw] session_id
# The ID of the streaming session.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ExpireSessionRequest AWS API Documentation
#
class ExpireSessionRequest < Struct.new(
:session_id)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ExpireSessionResult AWS API Documentation
#
class ExpireSessionResult < Aws::EmptyStructure; end
# Contains the parameters for a fleet.
#
# @!attribute [rw] arn
# The ARN for the fleet.
# @return [String]
#
# @!attribute [rw] name
# The name of the fleet.
# @return [String]
#
# @!attribute [rw] display_name
# The fleet name for display.
# @return [String]
#
# @!attribute [rw] description
# The description for display.
# @return [String]
#
# @!attribute [rw] image_name
# The name of the image used to create the fleet.
# @return [String]
#
# @!attribute [rw] image_arn
# The ARN for the public, private, or shared image.
# @return [String]
#
# @!attribute [rw] instance_type
# The instance type to use when launching fleet instances.
# @return [String]
#
# @!attribute [rw] fleet_type
# The fleet type.
#
# ALWAYS\_ON
#
# : Provides users with instant-on access to their apps. You are
# charged for all running instances in your fleet, even if no users
# are streaming apps.
#
# ON\_DEMAND
#
# : Provide users with access to applications after they connect,
# which takes one to two minutes. You are charged for instance
# streaming when users are connected and a small hourly fee for
# instances that are not streaming apps.
# @return [String]
#
# @!attribute [rw] compute_capacity_status
# The capacity status for the fleet.
# @return [Types::ComputeCapacityStatus]
#
# @!attribute [rw] max_user_duration_in_seconds
# The maximum time that a streaming session can run, in seconds.
# Specify a value between 600 and 57600.
# @return [Integer]
#
# @!attribute [rw] disconnect_timeout_in_seconds
# The time after disconnection when a session is considered to have
# ended, in seconds. If a user who was disconnected reconnects within
# this time interval, the user is connected to their previous session.
# Specify a value between 60 and 57600.
# @return [Integer]
#
# @!attribute [rw] state
# The current state for the fleet.
# @return [String]
#
# @!attribute [rw] vpc_config
# The VPC configuration for the fleet.
# @return [Types::VpcConfig]
#
# @!attribute [rw] created_time
# The time the fleet was created.
# @return [Time]
#
# @!attribute [rw] fleet_errors
# The fleet errors.
# @return [Array<Types::FleetError>]
#
# @!attribute [rw] enable_default_internet_access
# Indicates whether default internet access is enabled for the fleet.
# @return [Boolean]
#
# @!attribute [rw] domain_join_info
# The information needed to join a Microsoft Active Directory domain.
# @return [Types::DomainJoinInfo]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/Fleet AWS API Documentation
#
class Fleet < Struct.new(
:arn,
:name,
:display_name,
:description,
:image_name,
:image_arn,
:instance_type,
:fleet_type,
:compute_capacity_status,
:max_user_duration_in_seconds,
:disconnect_timeout_in_seconds,
:state,
:vpc_config,
:created_time,
:fleet_errors,
:enable_default_internet_access,
:domain_join_info)
include Aws::Structure
end
# Describes a fleet error.
#
# @!attribute [rw] error_code
# The error code.
# @return [String]
#
# @!attribute [rw] error_message
# The error message.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/FleetError AWS API Documentation
#
class FleetError < Struct.new(
:error_code,
:error_message)
include Aws::Structure
end
# Describes an image.
#
# @!attribute [rw] name
# The name of the image.
# @return [String]
#
# @!attribute [rw] arn
# The ARN of the image.
# @return [String]
#
# @!attribute [rw] base_image_arn
# The ARN of the image from which this image was created.
# @return [String]
#
# @!attribute [rw] display_name
# The image name for display.
# @return [String]
#
# @!attribute [rw] state
# The image starts in the `PENDING` state. If image creation succeeds,
# the state is `AVAILABLE`. If image creation fails, the state is
# `FAILED`.
# @return [String]
#
# @!attribute [rw] visibility
# Indicates whether the image is public or private.
# @return [String]
#
# @!attribute [rw] image_builder_supported
# Indicates whether an image builder can be launched from this image.
# @return [Boolean]
#
# @!attribute [rw] platform
# The operating system platform of the image.
# @return [String]
#
# @!attribute [rw] description
# The description for display.
# @return [String]
#
# @!attribute [rw] state_change_reason
# The reason why the last state change occurred.
# @return [Types::ImageStateChangeReason]
#
# @!attribute [rw] applications
# The applications associated with the image.
# @return [Array<Types::Application>]
#
# @!attribute [rw] created_time
# The time the image was created.
# @return [Time]
#
# @!attribute [rw] public_base_image_released_date
# The release date of the public base image. For private images, this
# date is the release date of the base image from which the image was
# created.
# @return [Time]
#
# @!attribute [rw] appstream_agent_version
# The version of the AppStream 2.0 agent to use for instances that are
# launched from this image.
# @return [String]
#
# @!attribute [rw] image_permissions
# The permissions to provide to the destination AWS account for the
# specified image.
# @return [Types::ImagePermissions]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/Image AWS API Documentation
#
class Image < Struct.new(
:name,
:arn,
:base_image_arn,
:display_name,
:state,
:visibility,
:image_builder_supported,
:platform,
:description,
:state_change_reason,
:applications,
:created_time,
:public_base_image_released_date,
:appstream_agent_version,
:image_permissions)
include Aws::Structure
end
# Describes a streaming instance used for editing an image. New images
# are created from a snapshot through an image builder.
#
# @!attribute [rw] name
# The name of the image builder.
# @return [String]
#
# @!attribute [rw] arn
# The ARN for the image builder.
# @return [String]
#
# @!attribute [rw] image_arn
# The ARN of the image from which this builder was created.
# @return [String]
#
# @!attribute [rw] description
# The description for display.
# @return [String]
#
# @!attribute [rw] display_name
# The image builder name for display.
# @return [String]
#
# @!attribute [rw] vpc_config
# The VPC configuration of the image builder.
# @return [Types::VpcConfig]
#
# @!attribute [rw] instance_type
# The instance type for the image builder.
# @return [String]
#
# @!attribute [rw] platform
# The operating system platform of the image builder.
# @return [String]
#
# @!attribute [rw] state
# The state of the image builder.
# @return [String]
#
# @!attribute [rw] state_change_reason
# The reason why the last state change occurred.
# @return [Types::ImageBuilderStateChangeReason]
#
# @!attribute [rw] created_time
# The time stamp when the image builder was created.
# @return [Time]
#
# @!attribute [rw] enable_default_internet_access
# Enables or disables default internet access for the image builder.
# @return [Boolean]
#
# @!attribute [rw] domain_join_info
# The information needed to join a Microsoft Active Directory domain.
# @return [Types::DomainJoinInfo]
#
# @!attribute [rw] image_builder_errors
# The image builder errors.
# @return [Array<Types::ResourceError>]
#
# @!attribute [rw] appstream_agent_version
# The version of the AppStream 2.0 agent that is currently being used
# by this image builder.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ImageBuilder AWS API Documentation
#
class ImageBuilder < Struct.new(
:name,
:arn,
:image_arn,
:description,
:display_name,
:vpc_config,
:instance_type,
:platform,
:state,
:state_change_reason,
:created_time,
:enable_default_internet_access,
:domain_join_info,
:image_builder_errors,
:appstream_agent_version)
include Aws::Structure
end
# Describes the reason why the last image builder state change occurred.
#
# @!attribute [rw] code
# The state change reason code.
# @return [String]
#
# @!attribute [rw] message
# The state change reason message.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ImageBuilderStateChangeReason AWS API Documentation
#
class ImageBuilderStateChangeReason < Struct.new(
:code,
:message)
include Aws::Structure
end
# Describes the permissions for an image.
#
# @note When making an API call, you may pass ImagePermissions
# data as a hash:
#
# {
# allow_fleet: false,
# allow_image_builder: false,
# }
#
# @!attribute [rw] allow_fleet
# Indicates whether the image can be used for a fleet.
# @return [Boolean]
#
# @!attribute [rw] allow_image_builder
# Indicates whether the image can be used for an image builder.
# @return [Boolean]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ImagePermissions AWS API Documentation
#
class ImagePermissions < Struct.new(
:allow_fleet,
:allow_image_builder)
include Aws::Structure
end
# Describes the reason why the last image state change occurred.
#
# @!attribute [rw] code
# The state change reason code.
# @return [String]
#
# @!attribute [rw] message
# The state change reason message.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ImageStateChangeReason AWS API Documentation
#
class ImageStateChangeReason < Struct.new(
:code,
:message)
include Aws::Structure
end
# @note When making an API call, you may pass ListAssociatedFleetsRequest
# data as a hash:
#
# {
# stack_name: "String", # required
# next_token: "String",
# }
#
# @!attribute [rw] stack_name
# The name of the stack.
# @return [String]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If this value is null, it retrieves the first page.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ListAssociatedFleetsRequest AWS API Documentation
#
class ListAssociatedFleetsRequest < Struct.new(
:stack_name,
:next_token)
include Aws::Structure
end
# @!attribute [rw] names
# The name of the fleet.
# @return [Array<String>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If there are no more pages, this value is null.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ListAssociatedFleetsResult AWS API Documentation
#
class ListAssociatedFleetsResult < Struct.new(
:names,
:next_token)
include Aws::Structure
end
# @note When making an API call, you may pass ListAssociatedStacksRequest
# data as a hash:
#
# {
# fleet_name: "String", # required
# next_token: "String",
# }
#
# @!attribute [rw] fleet_name
# The name of the fleet.
# @return [String]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If this value is null, it retrieves the first page.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ListAssociatedStacksRequest AWS API Documentation
#
class ListAssociatedStacksRequest < Struct.new(
:fleet_name,
:next_token)
include Aws::Structure
end
# @!attribute [rw] names
# The name of the stack.
# @return [Array<String>]
#
# @!attribute [rw] next_token
# The pagination token to use to retrieve the next page of results for
# this operation. If there are no more pages, this value is null.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ListAssociatedStacksResult AWS API Documentation
#
class ListAssociatedStacksResult < Struct.new(
:names,
:next_token)
include Aws::Structure
end
# @note When making an API call, you may pass ListTagsForResourceRequest
# data as a hash:
#
# {
# resource_arn: "Arn", # required
# }
#
# @!attribute [rw] resource_arn
# The Amazon Resource Name (ARN) of the resource.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ListTagsForResourceRequest AWS API Documentation
#
class ListTagsForResourceRequest < Struct.new(
:resource_arn)
include Aws::Structure
end
# @!attribute [rw] tags
# The information about the tags.
# @return [Hash<String,String>]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ListTagsForResourceResponse AWS API Documentation
#
class ListTagsForResourceResponse < Struct.new(
:tags)
include Aws::Structure
end
# The network details of the fleet instance for the streaming session.
#
# @!attribute [rw] eni_private_ip_address
# The private IP address of the elastic network interface that is
# attached to instances in your VPC.
# @return [String]
#
# @!attribute [rw] eni_id
# The resource identifier of the elastic network interface that is
# attached to instances in your VPC. All network interfaces have the
# eni-xxxxxxxx resource identifier.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/NetworkAccessConfiguration AWS API Documentation
#
class NetworkAccessConfiguration < Struct.new(
:eni_private_ip_address,
:eni_id)
include Aws::Structure
end
# Describes a resource error.
#
# @!attribute [rw] error_code
# The error code.
# @return [String]
#
# @!attribute [rw] error_message
# The error message.
# @return [String]
#
# @!attribute [rw] error_timestamp
# The time the error occurred.
# @return [Time]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ResourceError AWS API Documentation
#
class ResourceError < Struct.new(
:error_code,
:error_message,
:error_timestamp)
include Aws::Structure
end
# Describes the credentials for the service account used by the
# streaming instance to connect to the directory.
#
# @note When making an API call, you may pass ServiceAccountCredentials
# data as a hash:
#
# {
# account_name: "AccountName", # required
# account_password: "AccountPassword", # required
# }
#
# @!attribute [rw] account_name
# The user name of the account. This account must have the following
# privileges: create computer objects, join computers to the domain,
# and change/reset the password on descendant computer objects for the
# organizational units specified.
# @return [String]
#
# @!attribute [rw] account_password
# The password for the account.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/ServiceAccountCredentials AWS API Documentation
#
class ServiceAccountCredentials < Struct.new(
:account_name,
:account_password)
include Aws::Structure
end
# Describes a streaming session.
#
# @!attribute [rw] id
# The ID of the streaming session.
# @return [String]
#
# @!attribute [rw] user_id
# The identifier of the user for whom the session was created.
# @return [String]
#
# @!attribute [rw] stack_name
# The name of the stack for the streaming session.
# @return [String]
#
# @!attribute [rw] fleet_name
# The name of the fleet for the streaming session.
# @return [String]
#
# @!attribute [rw] state
# The current state of the streaming session.
# @return [String]
#
# @!attribute [rw] authentication_type
# The authentication method. The user is authenticated using a
# streaming URL (`API`) or SAML federation (`SAML`).
# @return [String]
#
# @!attribute [rw] network_access_configuration
# The network details for the streaming session.
# @return [Types::NetworkAccessConfiguration]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/Session AWS API Documentation
#
class Session < Struct.new(
:id,
:user_id,
:stack_name,
:fleet_name,
:state,
:authentication_type,
:network_access_configuration)
include Aws::Structure
end
# Describes the permissions that are available to the specified AWS
# account for a shared image.
#
# @!attribute [rw] shared_account_id
# The 12-digit ID of the AWS account with which the image is shared.
# @return [String]
#
# @!attribute [rw] image_permissions
# Describes the permissions for a shared image.
# @return [Types::ImagePermissions]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/SharedImagePermissions AWS API Documentation
#
class SharedImagePermissions < Struct.new(
:shared_account_id,
:image_permissions)
include Aws::Structure
end
# Describes a stack.
#
# @!attribute [rw] arn
# The ARN of the stack.
# @return [String]
#
# @!attribute [rw] name
# The name of the stack.
# @return [String]
#
# @!attribute [rw] description
# The description for display.
# @return [String]
#
# @!attribute [rw] display_name
# The stack name for display.
# @return [String]
#
# @!attribute [rw] created_time
# The time the stack was created.
# @return [Time]
#
# @!attribute [rw] storage_connectors
# The storage connectors to enable.
# @return [Array<Types::StorageConnector>]
#
# @!attribute [rw] redirect_url
# The URL that users are redirected to after their streaming session
# ends.
# @return [String]
#
# @!attribute [rw] feedback_url
# The URL that users are redirected to after they click the Send
# Feedback link. If no URL is specified, no Send Feedback link is
# displayed.
# @return [String]
#
# @!attribute [rw] stack_errors
# The errors for the stack.
# @return [Array<Types::StackError>]
#
# @!attribute [rw] user_settings
# The actions that are enabled or disabled for users during their
# streaming sessions. By default these actions are enabled.
# @return [Array<Types::UserSetting>]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/Stack AWS API Documentation
#
class Stack < Struct.new(
:arn,
:name,
:description,
:display_name,
:created_time,
:storage_connectors,
:redirect_url,
:feedback_url,
:stack_errors,
:user_settings)
include Aws::Structure
end
# Describes a stack error.
#
# @!attribute [rw] error_code
# The error code.
# @return [String]
#
# @!attribute [rw] error_message
# The error message.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/StackError AWS API Documentation
#
class StackError < Struct.new(
:error_code,
:error_message)
include Aws::Structure
end
# @note When making an API call, you may pass StartFleetRequest
# data as a hash:
#
# {
# name: "String", # required
# }
#
# @!attribute [rw] name
# The name of the fleet.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/StartFleetRequest AWS API Documentation
#
class StartFleetRequest < Struct.new(
:name)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/StartFleetResult AWS API Documentation
#
class StartFleetResult < Aws::EmptyStructure; end
# @note When making an API call, you may pass StartImageBuilderRequest
# data as a hash:
#
# {
# name: "String", # required
# appstream_agent_version: "AppstreamAgentVersion",
# }
#
# @!attribute [rw] name
# The name of the image builder.
# @return [String]
#
# @!attribute [rw] appstream_agent_version
# The version of the AppStream 2.0 agent to use for this image
# builder. To use the latest version of the AppStream 2.0 agent,
# specify \[LATEST\].
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/StartImageBuilderRequest AWS API Documentation
#
class StartImageBuilderRequest < Struct.new(
:name,
:appstream_agent_version)
include Aws::Structure
end
# @!attribute [rw] image_builder
# Information about the image builder.
# @return [Types::ImageBuilder]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/StartImageBuilderResult AWS API Documentation
#
class StartImageBuilderResult < Struct.new(
:image_builder)
include Aws::Structure
end
# @note When making an API call, you may pass StopFleetRequest
# data as a hash:
#
# {
# name: "String", # required
# }
#
# @!attribute [rw] name
# The name of the fleet.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/StopFleetRequest AWS API Documentation
#
class StopFleetRequest < Struct.new(
:name)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/StopFleetResult AWS API Documentation
#
class StopFleetResult < Aws::EmptyStructure; end
# @note When making an API call, you may pass StopImageBuilderRequest
# data as a hash:
#
# {
# name: "String", # required
# }
#
# @!attribute [rw] name
# The name of the image builder.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/StopImageBuilderRequest AWS API Documentation
#
class StopImageBuilderRequest < Struct.new(
:name)
include Aws::Structure
end
# @!attribute [rw] image_builder
# Information about the image builder.
# @return [Types::ImageBuilder]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/StopImageBuilderResult AWS API Documentation
#
class StopImageBuilderResult < Struct.new(
:image_builder)
include Aws::Structure
end
# Describes a connector to enable persistent storage for users.
#
# @note When making an API call, you may pass StorageConnector
# data as a hash:
#
# {
# connector_type: "HOMEFOLDERS", # required, accepts HOMEFOLDERS, GOOGLE_DRIVE, ONE_DRIVE
# resource_identifier: "ResourceIdentifier",
# domains: ["Domain"],
# }
#
# @!attribute [rw] connector_type
# The type of storage connector.
# @return [String]
#
# @!attribute [rw] resource_identifier
# The ARN of the storage connector.
# @return [String]
#
# @!attribute [rw] domains
# The names of the domains for the G Suite account.
# @return [Array<String>]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/StorageConnector AWS API Documentation
#
class StorageConnector < Struct.new(
:connector_type,
:resource_identifier,
:domains)
include Aws::Structure
end
# @note When making an API call, you may pass TagResourceRequest
# data as a hash:
#
# {
# resource_arn: "Arn", # required
# tags: { # required
# "TagKey" => "TagValue",
# },
# }
#
# @!attribute [rw] resource_arn
# The Amazon Resource Name (ARN) of the resource.
# @return [String]
#
# @!attribute [rw] tags
# The tags to associate. A tag is a key-value pair (the value is
# optional). For example, `Environment=Test`, or, if you do not
# specify a value, `Environment=`.
#
# If you do not specify a value, we set the value to an empty string.
# @return [Hash<String,String>]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/TagResourceRequest AWS API Documentation
#
class TagResourceRequest < Struct.new(
:resource_arn,
:tags)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/TagResourceResponse AWS API Documentation
#
class TagResourceResponse < Aws::EmptyStructure; end
# @note When making an API call, you may pass UntagResourceRequest
# data as a hash:
#
# {
# resource_arn: "Arn", # required
# tag_keys: ["TagKey"], # required
# }
#
# @!attribute [rw] resource_arn
# The Amazon Resource Name (ARN) of the resource.
# @return [String]
#
# @!attribute [rw] tag_keys
# The tag keys for the tags to disassociate.
# @return [Array<String>]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UntagResourceRequest AWS API Documentation
#
class UntagResourceRequest < Struct.new(
:resource_arn,
:tag_keys)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UntagResourceResponse AWS API Documentation
#
class UntagResourceResponse < Aws::EmptyStructure; end
# @note When making an API call, you may pass UpdateDirectoryConfigRequest
# data as a hash:
#
# {
# directory_name: "DirectoryName", # required
# organizational_unit_distinguished_names: ["OrganizationalUnitDistinguishedName"],
# service_account_credentials: {
# account_name: "AccountName", # required
# account_password: "AccountPassword", # required
# },
# }
#
# @!attribute [rw] directory_name
# The name of the Directory Config object.
# @return [String]
#
# @!attribute [rw] organizational_unit_distinguished_names
# The distinguished names of the organizational units for computer
# accounts.
# @return [Array<String>]
#
# @!attribute [rw] service_account_credentials
# The credentials for the service account used by the streaming
# instance to connect to the directory.
# @return [Types::ServiceAccountCredentials]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UpdateDirectoryConfigRequest AWS API Documentation
#
class UpdateDirectoryConfigRequest < Struct.new(
:directory_name,
:organizational_unit_distinguished_names,
:service_account_credentials)
include Aws::Structure
end
# @!attribute [rw] directory_config
# Information about the Directory Config object.
# @return [Types::DirectoryConfig]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UpdateDirectoryConfigResult AWS API Documentation
#
class UpdateDirectoryConfigResult < Struct.new(
:directory_config)
include Aws::Structure
end
# @note When making an API call, you may pass UpdateFleetRequest
# data as a hash:
#
# {
# image_name: "String",
# image_arn: "Arn",
# name: "String",
# instance_type: "String",
# compute_capacity: {
# desired_instances: 1, # required
# },
# vpc_config: {
# subnet_ids: ["String"],
# security_group_ids: ["String"],
# },
# max_user_duration_in_seconds: 1,
# disconnect_timeout_in_seconds: 1,
# delete_vpc_config: false,
# description: "Description",
# display_name: "DisplayName",
# enable_default_internet_access: false,
# domain_join_info: {
# directory_name: "DirectoryName",
# organizational_unit_distinguished_name: "OrganizationalUnitDistinguishedName",
# },
# attributes_to_delete: ["VPC_CONFIGURATION"], # accepts VPC_CONFIGURATION, VPC_CONFIGURATION_SECURITY_GROUP_IDS, DOMAIN_JOIN_INFO
# }
#
# @!attribute [rw] image_name
# The name of the image used to create the fleet.
# @return [String]
#
# @!attribute [rw] image_arn
# The ARN of the public, private, or shared image to use.
# @return [String]
#
# @!attribute [rw] name
# A unique name for the fleet.
# @return [String]
#
# @!attribute [rw] instance_type
# The instance type to use when launching fleet instances. The
# following instance types are available:
#
# * stream.standard.medium
#
# * stream.standard.large
#
# * stream.compute.large
#
# * stream.compute.xlarge
#
# * stream.compute.2xlarge
#
# * stream.compute.4xlarge
#
# * stream.compute.8xlarge
#
# * stream.memory.large
#
# * stream.memory.xlarge
#
# * stream.memory.2xlarge
#
# * stream.memory.4xlarge
#
# * stream.memory.8xlarge
#
# * stream.graphics-design.large
#
# * stream.graphics-design.xlarge
#
# * stream.graphics-design.2xlarge
#
# * stream.graphics-design.4xlarge
#
# * stream.graphics-desktop.2xlarge
#
# * stream.graphics-pro.4xlarge
#
# * stream.graphics-pro.8xlarge
#
# * stream.graphics-pro.16xlarge
# @return [String]
#
# @!attribute [rw] compute_capacity
# The desired capacity for the fleet.
# @return [Types::ComputeCapacity]
#
# @!attribute [rw] vpc_config
# The VPC configuration for the fleet.
# @return [Types::VpcConfig]
#
# @!attribute [rw] max_user_duration_in_seconds
# The maximum time that a streaming session can run, in seconds.
# Specify a value between 600 and 57600.
# @return [Integer]
#
# @!attribute [rw] disconnect_timeout_in_seconds
# The time after disconnection when a session is considered to have
# ended, in seconds. If a user who was disconnected reconnects within
# this time interval, the user is connected to their previous session.
# Specify a value between 60 and 57600.
# @return [Integer]
#
# @!attribute [rw] delete_vpc_config
# Deletes the VPC association for the specified fleet.
# @return [Boolean]
#
# @!attribute [rw] description
# The description for display.
# @return [String]
#
# @!attribute [rw] display_name
# The fleet name for display.
# @return [String]
#
# @!attribute [rw] enable_default_internet_access
# Enables or disables default internet access for the fleet.
# @return [Boolean]
#
# @!attribute [rw] domain_join_info
# The information needed to join a Microsoft Active Directory domain.
# @return [Types::DomainJoinInfo]
#
# @!attribute [rw] attributes_to_delete
# The fleet attributes to delete.
# @return [Array<String>]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UpdateFleetRequest AWS API Documentation
#
class UpdateFleetRequest < Struct.new(
:image_name,
:image_arn,
:name,
:instance_type,
:compute_capacity,
:vpc_config,
:max_user_duration_in_seconds,
:disconnect_timeout_in_seconds,
:delete_vpc_config,
:description,
:display_name,
:enable_default_internet_access,
:domain_join_info,
:attributes_to_delete)
include Aws::Structure
end
# @!attribute [rw] fleet
# Information about the fleet.
# @return [Types::Fleet]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UpdateFleetResult AWS API Documentation
#
class UpdateFleetResult < Struct.new(
:fleet)
include Aws::Structure
end
# @note When making an API call, you may pass UpdateImagePermissionsRequest
# data as a hash:
#
# {
# name: "Name", # required
# shared_account_id: "AwsAccountId", # required
# image_permissions: { # required
# allow_fleet: false,
# allow_image_builder: false,
# },
# }
#
# @!attribute [rw] name
# The name of the private image.
# @return [String]
#
# @!attribute [rw] shared_account_id
# The 12-digit ID of the AWS account for which you want add or update
# image permissions.
# @return [String]
#
# @!attribute [rw] image_permissions
# The permissions for the image.
# @return [Types::ImagePermissions]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UpdateImagePermissionsRequest AWS API Documentation
#
class UpdateImagePermissionsRequest < Struct.new(
:name,
:shared_account_id,
:image_permissions)
include Aws::Structure
end
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UpdateImagePermissionsResult AWS API Documentation
#
class UpdateImagePermissionsResult < Aws::EmptyStructure; end
# @note When making an API call, you may pass UpdateStackRequest
# data as a hash:
#
# {
# display_name: "DisplayName",
# description: "Description",
# name: "String", # required
# storage_connectors: [
# {
# connector_type: "HOMEFOLDERS", # required, accepts HOMEFOLDERS, GOOGLE_DRIVE, ONE_DRIVE
# resource_identifier: "ResourceIdentifier",
# domains: ["Domain"],
# },
# ],
# delete_storage_connectors: false,
# redirect_url: "RedirectURL",
# feedback_url: "FeedbackURL",
# attributes_to_delete: ["STORAGE_CONNECTORS"], # accepts STORAGE_CONNECTORS, STORAGE_CONNECTOR_HOMEFOLDERS, STORAGE_CONNECTOR_GOOGLE_DRIVE, STORAGE_CONNECTOR_ONE_DRIVE, REDIRECT_URL, FEEDBACK_URL, THEME_NAME, USER_SETTINGS
# user_settings: [
# {
# action: "CLIPBOARD_COPY_FROM_LOCAL_DEVICE", # required, accepts CLIPBOARD_COPY_FROM_LOCAL_DEVICE, CLIPBOARD_COPY_TO_LOCAL_DEVICE, FILE_UPLOAD, FILE_DOWNLOAD, PRINTING_TO_LOCAL_DEVICE
# permission: "ENABLED", # required, accepts ENABLED, DISABLED
# },
# ],
# }
#
# @!attribute [rw] display_name
# The stack name for display.
# @return [String]
#
# @!attribute [rw] description
# The description for display.
# @return [String]
#
# @!attribute [rw] name
# The name of the stack.
# @return [String]
#
# @!attribute [rw] storage_connectors
# The storage connectors to enable.
# @return [Array<Types::StorageConnector>]
#
# @!attribute [rw] delete_storage_connectors
# Deletes the storage connectors currently enabled for the stack.
# @return [Boolean]
#
# @!attribute [rw] redirect_url
# The URL that users are redirected to after their streaming session
# ends.
# @return [String]
#
# @!attribute [rw] feedback_url
# The URL that users are redirected to after they click the Send
# Feedback link. If no URL is specified, no Send Feedback link is
# displayed.
# @return [String]
#
# @!attribute [rw] attributes_to_delete
# The stack attributes to delete.
# @return [Array<String>]
#
# @!attribute [rw] user_settings
# The actions that are enabled or disabled for users during their
# streaming sessions. By default, these actions are enabled.
# @return [Array<Types::UserSetting>]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UpdateStackRequest AWS API Documentation
#
class UpdateStackRequest < Struct.new(
:display_name,
:description,
:name,
:storage_connectors,
:delete_storage_connectors,
:redirect_url,
:feedback_url,
:attributes_to_delete,
:user_settings)
include Aws::Structure
end
# @!attribute [rw] stack
# Information about the stack.
# @return [Types::Stack]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UpdateStackResult AWS API Documentation
#
class UpdateStackResult < Struct.new(
:stack)
include Aws::Structure
end
# Describes an action and whether the action is enabled or disabled for
# users during their streaming sessions.
#
# @note When making an API call, you may pass UserSetting
# data as a hash:
#
# {
# action: "CLIPBOARD_COPY_FROM_LOCAL_DEVICE", # required, accepts CLIPBOARD_COPY_FROM_LOCAL_DEVICE, CLIPBOARD_COPY_TO_LOCAL_DEVICE, FILE_UPLOAD, FILE_DOWNLOAD, PRINTING_TO_LOCAL_DEVICE
# permission: "ENABLED", # required, accepts ENABLED, DISABLED
# }
#
# @!attribute [rw] action
# The action that is enabled or disabled.
# @return [String]
#
# @!attribute [rw] permission
# Indicates whether the action is enabled or disabled.
# @return [String]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/UserSetting AWS API Documentation
#
class UserSetting < Struct.new(
:action,
:permission)
include Aws::Structure
end
# Describes VPC configuration information.
#
# @note When making an API call, you may pass VpcConfig
# data as a hash:
#
# {
# subnet_ids: ["String"],
# security_group_ids: ["String"],
# }
#
# @!attribute [rw] subnet_ids
# The subnets to which a network interface is established from the
# fleet instance.
# @return [Array<String>]
#
# @!attribute [rw] security_group_ids
# The security groups for the fleet.
# @return [Array<String>]
#
# @see http://docs.aws.amazon.com/goto/WebAPI/appstream-2016-12-01/VpcConfig AWS API Documentation
#
class VpcConfig < Struct.new(
:subnet_ids,
:security_group_ids)
include Aws::Structure
end
end
end
| {
"redpajama_set_name": "RedPajamaGithub"
} | 9,344 | [
128000,
4450,
41183,
487,
2213,
3103,
198,
220,
4793,
21431,
271,
262,
674,
3959,
56236,
459,
3851,
304,
279,
3851,
16808,
627,
262,
9733,
262,
674,
571,
0,
9294,
510,
32868,
60,
836,
198,
262,
674,
256,
578,
836,
315,
279,
3851,
627,
262,
674,
256,
571,
693,
510,
707,
933,
262,
9733,
262,
674,
571,
0,
9294,
510,
32868,
60,
3113,
1292,
198,
262,
674,
256,
578,
3851,
836,
369,
3113,
627,
262,
674,
256,
571,
693,
510,
707,
933,
262,
9733,
262,
674,
571,
0,
9294,
510,
32868,
60,
4706,
2975,
198,
262,
674,
256,
578,
5665,
369,
279,
3851,
4706,
13,
1115,
5665,
2643,
387,
892,
2922,
32611,
627,
262,
674,
256,
571,
693,
510,
707,
933,
262,
9733,
262,
674,
571,
0,
9294,
510
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
4450,
41183,
487,
2213,
3103,
198,
220,
4793,
21431,
271,
262,
674,
3959,
56236,
459,
3851,
304,
279,
3851,
16808,
627,
262,
9733,
262,
674,
571,
0,
9294,
510,
32868,
60,
836,
198,
262,
674,
256,
578,
836,
315,
279,
3851,
627,
262,
674,
256,
571,
693,
510,
707,
933,
262,
9733,
262,
674,
571,
0,
9294,
510,
32868,
60,
3113,
1292,
198,
262,
674,
256,
578,
3851,
836,
369,
3113,
627,
262,
674,
256,
571,
693,
510,
707,
933,
262,
9733,
262,
674,
571,
0,
9294,
510,
32868,
60,
4706,
2975,
198,
262,
674,
256,
578,
5665,
369,
279,
3851,
4706,
13,
1115,
5665,
2643,
387,
892,
2922,
32611,
627,
262,
674,
256,
571,
693,
510,
707,
933,
262,
9733,
262,
674,
571,
0,
9294,
510,
-100
] |
About the Parkway
New exhibits at Waterrock Knob Visitor Center showcase wildlife and more
Elk display Waterrock Knob.jpg
A new elk display at Waterrock Knob Visitor Center on the Blue Ridge Parkway.
Did you know that elk can run up to 45 miles per hour? That black bear cubs stay with their mother for 18 months learning to hunt and survive? That, at 6,293 feet, Waterrock Knob is the highest peak in the Plott Balsam Mountains?
Thanks to donor support, new exhibits are now sharing these fascinating facts and more insights with people who visit Waterrock Knob Visitor Center at milepost 451.2, near Sylva, North Carolina. The attractive panels and displays installed in September are replacements for time-worn and outdated exhibits. For example, makeshift poster board displays have been replaced with new permanent panels that tell how elk have returned to the Parkway.
A 12-foot mural illustrates a multi-seasonal peek at some of the unique flora and fauna of this high elevation environment, as well as the striking geological features of the brightly colored rock formations found on cliffs near the visitor center. Another panel tells the Cherokee story of "How the World was Made," which describes the buzzard creating the peaks and valleys with its wings, in both Cherokee syllabary and English. An interactive element encourages visitors to turn a handle to see a magnified version of a balsam woolly adelgid, the insect responsible for the death of many trees visible from a large window.
The designs were a collaboration between National Park Service interpretive staff and David Williams of Wingin' It Works, which specializes in exhibits, murals, and scientific illustration. Joe Bistany of BistanyWorks provided fabrication and technical assistance.
"On-site meetings with rangers and visitor center staff who experience Waterrock Knob throughout the year allowed me to get a better understanding of the beauty, diversity and often harsh reality of this high elevation habitat," Williams said. "Multiple hikes, photo shoots and careful observation gave me the needed reference to pass along some of the fascinating information that's proudly shared by the people who love this unique stopover."
To enjoy the displays before the visitor center closes for the season, stop by between 10 a.m. and 5 p.m., each day through November 14.
Waterrock Knob
Blue Ridge Parkway Visitor Center
Sign up for our newsletters, we promise not to spam you. We only send out the good stuff.
Blue Ridge Parkway Foundation on Facebook
Blue Ridge Parkway Foundation on LinkedIn
Blue Ridge Parkway Foundation on YouTube
Blue Ridge Parkway Foundation on Twitter
Blue Ridge Parkway Foundation
717 S. Marshall Street
Additional offices in Asheville, North Carolina, and Galax and Lynchburg, Virginia
A Proud Partner of The National Park Service
Blue Ridge Parkway Foundation is a 501(c)(3) nonprofit organization (Tax ID: 31-1512730) and an official National Park Service partner of the Blue Ridge Parkway
Web Design by Alloy Marketing Agency | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 4,580 | [
128000,
10714,
279,
68253,
198,
3648,
50829,
520,
10164,
21161,
13934,
677,
56982,
5955,
35883,
30405,
323,
810,
198,
6719,
74,
3113,
10164,
21161,
13934,
677,
4924,
198,
32,
502,
77942,
3113,
520,
10164,
21161,
13934,
677,
56982,
5955,
389,
279,
8868,
35305,
68253,
627,
7131,
499,
1440,
430,
77942,
649,
1629,
709,
311,
220,
1774,
8931,
824,
6596,
30,
3011,
3776,
11984,
272,
16115,
4822,
449,
872,
6691,
369,
220,
972,
4038,
6975,
311,
19614,
323,
18167,
30,
3011,
11,
520,
220,
21,
11,
17313,
7693,
11,
10164,
21161,
13934,
677,
374,
279,
8592,
16557,
304,
279,
1856,
1751,
426,
1147,
309,
41114,
5380,
12947,
311,
35558,
1862,
11,
502,
50829,
527,
1457,
11821,
1521,
27387,
13363,
323,
810,
26793,
449,
1274,
889,
4034,
10164,
21161,
13934
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
10714,
279,
68253,
198,
3648,
50829,
520,
10164,
21161,
13934,
677,
56982,
5955,
35883,
30405,
323,
810,
198,
6719,
74,
3113,
10164,
21161,
13934,
677,
4924,
198,
32,
502,
77942,
3113,
520,
10164,
21161,
13934,
677,
56982,
5955,
389,
279,
8868,
35305,
68253,
627,
7131,
499,
1440,
430,
77942,
649,
1629,
709,
311,
220,
1774,
8931,
824,
6596,
30,
3011,
3776,
11984,
272,
16115,
4822,
449,
872,
6691,
369,
220,
972,
4038,
6975,
311,
19614,
323,
18167,
30,
3011,
11,
520,
220,
21,
11,
17313,
7693,
11,
10164,
21161,
13934,
677,
374,
279,
8592,
16557,
304,
279,
1856,
1751,
426,
1147,
309,
41114,
5380,
12947,
311,
35558,
1862,
11,
502,
50829,
527,
1457,
11821,
1521,
27387,
13363,
323,
810,
26793,
449,
1274,
889,
4034,
10164,
21161,
13934,
-100
] |
The Outwell Extension Size 2 is suitable for a collection of Outwell tents, designed to securely fit to the tent to create extra living and storage space externally from the tent. The extension will provide any camper with extra flexibility, and provides great stability at the front of the tent, offering a great place to relax with a beverage at the end of any day of outdoor pursuits.
The Outwell Universal Extension 2 is new to the collection for 2019, designed to fit specific tents in the Outwell collection, adding extra versatility, living space and storage space to any of the below tents. Furthermore, the extension is beautifully made, and will clip onto the matching tents with ease and stability. The extension features steel poles, ensuring it is sturdy, and able to provide adequate protection from the elements. The extension has large, tinted windows, and will fit into the designs, colours and styles of the matching tents, for a seamless transition and fit.
Connected via webbing for a secure fit.
One guyrope either side of extension. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,118 | [
128000,
791,
4470,
9336,
27571,
8645,
220,
17,
374,
14791,
369,
264,
4526,
315,
4470,
9336,
64470,
11,
6319,
311,
52123,
5052,
311,
279,
16006,
311,
1893,
5066,
5496,
323,
5942,
3634,
69442,
505,
279,
16006,
13,
578,
9070,
690,
3493,
904,
92153,
449,
5066,
25152,
11,
323,
5825,
2294,
20334,
520,
279,
4156,
315,
279,
16006,
11,
10209,
264,
2294,
2035,
311,
12234,
449,
264,
43450,
520,
279,
842,
315,
904,
1938,
315,
16166,
90887,
627,
791,
4470,
9336,
26581,
27571,
220,
17,
374,
502,
311,
279,
4526,
369,
220,
679,
24,
11,
6319,
311,
5052,
3230,
64470,
304,
279,
4470,
9336,
4526,
11,
7999,
5066,
60112,
11,
5496,
3634,
323,
5942,
3634,
311,
904,
315,
279,
3770,
64470,
13,
24296,
11,
279,
9070,
374,
32719,
1903
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
4470,
9336,
27571,
8645,
220,
17,
374,
14791,
369,
264,
4526,
315,
4470,
9336,
64470,
11,
6319,
311,
52123,
5052,
311,
279,
16006,
311,
1893,
5066,
5496,
323,
5942,
3634,
69442,
505,
279,
16006,
13,
578,
9070,
690,
3493,
904,
92153,
449,
5066,
25152,
11,
323,
5825,
2294,
20334,
520,
279,
4156,
315,
279,
16006,
11,
10209,
264,
2294,
2035,
311,
12234,
449,
264,
43450,
520,
279,
842,
315,
904,
1938,
315,
16166,
90887,
627,
791,
4470,
9336,
26581,
27571,
220,
17,
374,
502,
311,
279,
4526,
369,
220,
679,
24,
11,
6319,
311,
5052,
3230,
64470,
304,
279,
4470,
9336,
4526,
11,
7999,
5066,
60112,
11,
5496,
3634,
323,
5942,
3634,
311,
904,
315,
279,
3770,
64470,
13,
24296,
11,
279,
9070,
374,
32719,
1903,
-100
] |
News| Details Surface From Fatal Raid On Al Qaeda Compound
The Aviationist
Yemen Raid.
Last week a group of Navy Seals led an assault on a heavily-fortified Al Qaeda base located in Yemen. Unfortunately, things did no go exactly as planned andU.S. Navy Chief Petty Officer William "Ryan" Owens was killed by militants during a firefight. While many details of the operation remain confidential, some information is beginning to trickle out.
"It was as though Al Qaeda knew the SEALs were coming and were ready."
The operation was planned within the finals days of the Obama Administration and approved by President Trump. Seal Team Six was dispatched to Yemen in a U.S. Marine MV-22 Osprey. The Osprey suffered a hard landing injuring three members of the Seal members and was destroyed shortly to prevent it from falling into enemy hands.
The Seal team was sent to Yemen to target several high-ranking Al Qaeda members and obtain electronic files, computers and hard drives. Upon entry into the heavily fortified compound a firefight between erupted between the two sides. Pentagon officials confirmed that Owens was killed and three other seals were wounded in the ensuing battle. At least fourteen al Qaeda members were killed in the fight, including three high-ranking officials.
Location of the al Qaeda compound.
President Donald Trump made an unannounced visit to the funeral of Ryan Owens to pay his respects to the hero who gave his life for his country. Straits Times provides further details emerging from the Yemen Raid in this clip. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 4,299 | [
128000,
14710,
91,
12589,
28061,
5659,
66729,
33800,
1952,
1708,
54118,
62672,
198,
791,
50047,
380,
198,
56,
16737,
33800,
627,
5966,
2046,
264,
1912,
315,
19574,
1369,
1147,
6197,
459,
11965,
389,
264,
17345,
2269,
371,
1908,
1708,
54118,
2385,
7559,
304,
33790,
13,
19173,
11,
2574,
1550,
912,
733,
7041,
439,
13205,
323,
52,
815,
13,
19574,
14681,
95798,
20148,
12656,
330,
49546,
1,
64457,
574,
7577,
555,
39449,
2391,
264,
38703,
13,
6104,
1690,
3649,
315,
279,
5784,
7293,
27285,
11,
1063,
2038,
374,
7314,
311,
98444,
704,
627,
12348,
574,
439,
3582,
1708,
54118,
7020,
279,
88679,
82,
1051,
5108,
323,
1051,
5644,
10246,
791,
5784,
574,
13205,
2949,
279,
41402,
2919,
315,
279,
7250,
17128,
323,
12054,
555,
4900,
3420,
13,
53625,
8068
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
14710,
91,
12589,
28061,
5659,
66729,
33800,
1952,
1708,
54118,
62672,
198,
791,
50047,
380,
198,
56,
16737,
33800,
627,
5966,
2046,
264,
1912,
315,
19574,
1369,
1147,
6197,
459,
11965,
389,
264,
17345,
2269,
371,
1908,
1708,
54118,
2385,
7559,
304,
33790,
13,
19173,
11,
2574,
1550,
912,
733,
7041,
439,
13205,
323,
52,
815,
13,
19574,
14681,
95798,
20148,
12656,
330,
49546,
1,
64457,
574,
7577,
555,
39449,
2391,
264,
38703,
13,
6104,
1690,
3649,
315,
279,
5784,
7293,
27285,
11,
1063,
2038,
374,
7314,
311,
98444,
704,
627,
12348,
574,
439,
3582,
1708,
54118,
7020,
279,
88679,
82,
1051,
5108,
323,
1051,
5644,
10246,
791,
5784,
574,
13205,
2949,
279,
41402,
2919,
315,
279,
7250,
17128,
323,
12054,
555,
4900,
3420,
13,
53625,
8068,
-100
] |
Come to the newly named TCC Pat & Douglas Perry Glass Wheel Studio between noon and 5 p.m., to bid on a house or artwork by silent auction.
Tidewater Community College will bring its homemade gingerbread houses and student-created artwork to the NEON Holiday Market, a holiday shopping event sponsored by the Downtown Norfolk Council.
Come to the newly named TCC Pat & Douglas Perry Glass Wheel Studio, 128 W. Olney Road in Norfolk, between noon and 5 p.m. on Dec. 8 to bid on a house or artwork by silent auction. Enjoy hot chocolate and cookies while you browse indoors.
TCC's culinary arts students created the gingerbread delights loosely based on a Dickens theme. Assorted confections, colorful icing and other edible goodies make each home unique.
The artwork includes prints of paintings, graphic design, printmaking and photography.
All proceeds benefit TCC's Studio Arts and Culinary programs.
The larger NEON Holiday Market is a short walk away, at The Plot at Granby Street and Olney Road. More than 30 creative vendors will participate. Live music and food trucks will be part of the afternoon festivities. For information, visit downtownnorfolk.org and neonnfk.com.
TCC@NEON had its debut in October at the NEON Festival. The TCC Glass Wheel will house the college's public art gallery and ceramics and sculpture programs.
The Patricia & Douglas Perry TCC Center for Visual & Culinary Arts and Hospitality Management is also coming to the NEON District in 2021. The 47,000-square-foot building will allow TCC to expand its visual arts, culinary arts and hospitality management programs. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,689 | [
128000,
29951,
311,
279,
13945,
7086,
350,
3791,
7281,
612,
31164,
31421,
21396,
33442,
19074,
1990,
38245,
323,
220,
20,
281,
749,
2637,
311,
14435,
389,
264,
3838,
477,
29409,
555,
21737,
21852,
627,
51,
307,
48544,
12332,
9304,
690,
4546,
1202,
36433,
44768,
48616,
15316,
323,
5575,
72057,
29409,
311,
279,
8014,
715,
32769,
8152,
11,
264,
13560,
12185,
1567,
30638,
555,
279,
44985,
59792,
9251,
627,
29951,
311,
279,
13945,
7086,
350,
3791,
7281,
612,
31164,
31421,
21396,
33442,
19074,
11,
220,
4386,
468,
13,
12225,
3520,
9728,
304,
59792,
11,
1990,
38245,
323,
220,
20,
281,
749,
13,
389,
3799,
13,
220,
23,
311,
14435,
389,
264,
3838,
477,
29409,
555,
21737,
21852,
13,
23485,
4106,
18414,
323,
8443,
1418,
499,
27100,
55154,
627,
51
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
29951,
311,
279,
13945,
7086,
350,
3791,
7281,
612,
31164,
31421,
21396,
33442,
19074,
1990,
38245,
323,
220,
20,
281,
749,
2637,
311,
14435,
389,
264,
3838,
477,
29409,
555,
21737,
21852,
627,
51,
307,
48544,
12332,
9304,
690,
4546,
1202,
36433,
44768,
48616,
15316,
323,
5575,
72057,
29409,
311,
279,
8014,
715,
32769,
8152,
11,
264,
13560,
12185,
1567,
30638,
555,
279,
44985,
59792,
9251,
627,
29951,
311,
279,
13945,
7086,
350,
3791,
7281,
612,
31164,
31421,
21396,
33442,
19074,
11,
220,
4386,
468,
13,
12225,
3520,
9728,
304,
59792,
11,
1990,
38245,
323,
220,
20,
281,
749,
13,
389,
3799,
13,
220,
23,
311,
14435,
389,
264,
3838,
477,
29409,
555,
21737,
21852,
13,
23485,
4106,
18414,
323,
8443,
1418,
499,
27100,
55154,
627,
51,
-100
] |
Justia Regulation Tracker Department Of State 30-Day Notice of Proposed Information Collection: Foreign Diplomatic Services Applications (FDSA), 70609-70610 [2014-28050]
30-Day Notice of Proposed Information Collection: Foreign Diplomatic Services Applications (FDSA), 70609-70610 [2014-28050]
Download as PDF mstockstill on DSK4VPTVN1PROD with NOTICES Federal Register / Vol. 79, No. 228 / Wednesday, November 26, 2014 / Notices associated with its exchange members, with the provisions of the Exchange Act, the rules and regulations thereunder, and the rules of the Exchange. The proposed amendment to the Bylaws would make explicit that a nonaffiliated director cannot be removed for cause for decisions or actions taken in good faith related to the regulatory functions and responsibilities delegated to NYSE Regulation by the Exchange. The proposed amendment would therefore provide non-affiliated directors with reasonable assurances that actions or decisions consistent with their fiduciary duty and believed, in good faith, to be the proper exercise of NYSE Regulation's delegated functions and responsibilities could not be used as a basis to remove those directors from office. Accordingly, the Exchange believes that the proposed amendment would contribute to the orderly operation of the NYSE Regulation board of directors and its decision-making process, and would enable the Exchange to be so organized as to have the capacity to carry out the purposes of the Exchange Act and comply and enforce compliance by its members and persons associated with its members, with the provisions of the Exchange Act. The Exchange therefore believes that approval of the amendment to the Bylaws is consistent with Section 6(b)(1). The Exchange also believes that this filing furthers the objectives of Section 6(b)(5) of the Exchange Act 8 because the proposed rule change would be consistent with and facilitate a governance and regulatory structure that is designed to prevent fraudulent and manipulative acts and practices, to promote just and equitable principles of trade, to foster cooperation and coordination with persons engaged in regulating, clearing, settling, processing information with respect to, and facilitating transactions in securities, to remove impediments to, and perfect the mechanism of a free and open market and a national market system and, in general, to protect investors and the public interest. As discussed above, the Exchange believes that the proposed amendment would remove potential uncertainty among non-affiliated directors that certain decisions or actions taken in good faith related to the delegated functions and responsibilities could result in their removal from NYSE Regulation's board of directors for cause and thereby would contribute to improved effectiveness in the board decision-making process. The proposed amendment is therefore consistent with 8 15 U.S.C. 78f(b)(5). VerDate Sep<11>2014 17:21 Nov 25, 2014 Jkt 235001 and facilitates a governance and regulatory structure that furthers the objectives of Section 6(b)(5) of the Exchange Act. The orderly and efficient operation of NYSE Regulation and its board of directors is also designed to protect investors as well as the public interest. B. Self-Regulatory Organization's Statement on Burden on Competition The Exchange does not believe that the proposed rule change will impose any burden on competition that is not necessary or appropriate in furtherance of the purposes of the Exchange Act. The proposed rule change is not intended to address competitive issues but rather is concerned solely with the administration and functioning of the NYSE Regulation board of directors. C. Self-Regulatory Organization's Statement on Comments on the Proposed Rule Change Received From Members, Participants, or Others No written comments were solicited or received with respect to the proposed rule change. III. Date of Effectiveness of the Proposed Rule Change and Timing for Commission Action Within 45 days of the date of publication of this notice in the Federal Register or up to 90 days (i) as the Commission may designate if it finds such longer period to be appropriate and publishes its reasons for so finding or (ii) as to which the self-regulatory organization consents, the Commission will: (A) By order approve or disapprove the proposed rule change, or (B) institute proceedings to determine whether the proposed rule change should be disapproved. IV. Solicitation of Comments Interested persons are invited to submit written data, views, and arguments concerning the foregoing, including whether the proposed rule change is consistent with the Act. Comments may be submitted by any of the following methods: Electronic Comments • Use the Commission's Internet comment form (http://www.sec.gov/ rules/sro.shtml); or • Send an email to rule-comments@ sec.gov. Please include File Number SR– NYSE–2014–62 on the subject line. Paper Comments • Send paper comments in triplicate to Secretary, Securities and Exchange Commission, 100 F Street NE., Washington, DC 20549–1090. PO 00000 Frm 00111 Fmt 4703 Sfmt 4703 70609 All submissions should refer to File Number SR–NYSE–2014–62. This file number should be included on the subject line if email is used. To help the Commission process and review your comments more efficiently, please use only one method. The Commission will post all comments on the Commission's Internet Web site (http://www.sec.gov/ rules/sro.shtml). Copies of the submission, all subsequent amendments, all written statements with respect to the proposed rule change that are filed with the Commission, and all written communications relating to the proposed rule change between the Commission and any person, other than those that may be withheld from the public in accordance with the provisions of 5 U.S.C. 552, will be available for Web site viewing and printing in the Commission's Public Reference Room, 100 F Street NE., Washington, DC 20549 on official business days between the hours of 10:00 a.m. and 3:00 p.m. Copies of such filing also will be available for inspection and copying at the principal offices of the Exchange. All comments received will be posted without change; the Commission does not edit personal identifying information from submissions. You should submit only information that you wish to make available publicly. All submissions should refer to File Number SR–NYSE– 2014–62, and should be submitted on or beforeDecember 17, 2014. For the Commission, by the Division of Trading and Markets, pursuant to delegated authority.9 Kevin M. O'Neill, Deputy Secretary. [FR Doc. 2014–27975 Filed 11–25–14; 8:45 am] BILLING CODE 8011–01–P DEPARTMENT OF STATE [Public Notice 8954] 30-Day Notice of Proposed Information Collection: Foreign Diplomatic Services Applications (FDSA) Notice of request for public comment and submission to OMB of proposed collection of information. ACTION: The Department of State has submitted the information collection described below to the Office of Management and Budget (OMB) for approval. In accordance with the Paperwork Reduction Act of 1995 we are requesting comments on this SUMMARY: 9 17 CFR 200.30–3(a)(12). E:\FR\FM\26NON1.SGM 26NON1 mstockstill on DSK4VPTVN1PROD with NOTICES 70610 Federal Register / Vol. 79, No. 228 / Wednesday, November 26, 2014 / Notices collection from all interested individuals and organizations. The purpose of this Notice is to allow 30 days for public comment. DATES: Submit comments directly to the Office of Management and Budget (OMB) up to December 26, 2014. ADDRESSES: Direct comments to the Department of State Desk Officer in the Office of Information and Regulatory Affairs at the Office of Management and Budget (OMB). You may submit comments by the following methods: • Email: oira_submission@ omb.eop.gov. You must include the DS form number, information collection title, and the OMB control number in the subject line of your message. • Fax: 202–395–5806. Attention: Desk Officer for Department of State. FOR FURTHER INFORMATION CONTACT: Direct requests for additional information regarding the collection listed in this notice, including requests for copies of the proposed collection instrument and supporting documents, to Allyson King at 3507 International Place NW., Washington, DC 20008, who may be reached on (202) 647–3417 or at [email protected]. SUPPLEMENTARY INFORMATION: • Title of Information Collection: Foreign Diplomatic Services Applications (FDSA). • OMB Control Number: 1405–0105. • Type of Request: Revision of a Currently Approved Collection. • Originating Office: M/OFM. • Form Number: DS–99, DS–98, DS– 100, DS–101, DS–102, DS–104, DS– 1504, DS–1972, DS–2003, DS–2004, DS– 2005, DS–2006, DS–2007, DS–2008, DS– 2003 E, DS–1972 E, DS–4138, DS–4139, DS–4140, DS–4155, DS–7675, DS–1972 D, DS–1972 T, DS–4284, DS–4285. • Respondents: Foreign Mission Community. • Estimated Number of Respondents: 1108. • Estimated Number of Responses: 76,274 annually. • Average Time per Response: 12 minutes. • Total Estimated Burden Time: 12051.7 hours annually. • Frequency: On occasion; annually. • Obligation to Respond: Mandatory. We are soliciting public comments to permit the Department to: • Evaluate whether the proposed information collection is necessary for the proper functions of the Department. • Evaluate the accuracy of our estimate of the time and cost burden for this proposed collection, including the validity of the methodology and assumptions used. VerDate Sep<11>2014 17:21 Nov 25, 2014 Jkt 235001 • Enhance the quality, utility, and clarity of the information to be collected. • Minimize the reporting burden on those who are to respond, including the use of automated collection techniques or other forms of information technology. Please note that comments submitted in response to this Notice are public record. Before including any detailed personal information, you should be aware that your comments as submitted, including your personal information, will be available for public review. Abstract of proposed collection: Collection information instruments dealing with information collection from the foreign mission community, to include the electronic data compilation (e-Gov), have been combined under one information collection request, collectively referred to as the ''Foreign Diplomatic Services Applications''. These information collection instruments provide M/OFM with the information necessary to provide and administer an effective and efficient benefits, privileges, and immunities program by which foreign missions and eligible applicants may apply for entitled benefits from the U.S. Department of State. Methodology: Information may be received via mail, fax, or electronic submission. Dated: November 21, 2014. Clifton C. Seagroves, Director, Acting, Office of Foreign Missions, Department of State. [FR Doc. 2014–28050 Filed 11–25–14; 8:45 am] BILLING CODE 4710–35–P STATE JUSTICE INSTITUTE SJI Board of Directors Meeting, Notice State Justice Institute. Notice of meeting. AGENCY: ACTION: The SJI Board of Directors will be meeting on Monday, December 8, 2014 at 1:00 p.m. The meeting will be held at the Judicial Council of California. The purpose of this meeting is to consider grant applications for the 1st quarter of FY 2015, and other business. All portions of this meeting are open to the public. ADDRESSES: Judicial Council of California, Executive Office, Executive Office Conference Room, 5th Floor, 455 Golden Gate Ave., San Francisco, California. SUMMARY: FOR FURTHER INFORMATION CONTACT: Jonathan Mattiello, Executive Director, State Justice Institute, 11951 Freedom PO 00000 Frm 00112 Fmt 4703 Sfmt 4703 Drive, Suite 1020, Reston, VA 20190, 571–313–8843, [email protected]. Jonathan D. Mattiello, Executive Director. [FR Doc. 2014–27993 Filed 11–25–14; 8:45 am] BILLING CODE P DEPARTMENT OF TRANSPORTATION Maritime Administration [Docket No. DOT–MARAD 2014–0146] Agency Requests for Renewal of a Previously Approved Information Collection(s): Ship-Building Orderbook and Shipyard Employment Maritime Administration, Department of Transportation ACTION: Notice and request for comments. AGENCY: The Maritime Administration (MARAD) invites public comments about our intention to request the Office of Management and Budget (OMB) approval to renew an information collection. The information to be collected is necessary in order for MARAD to perform and carry out its duties required by Sections 210 and 211 of the Merchant Marine Act of 1936. We are required to publish this notice in the Federal Register by the Paperwork Reduction Act of 1995, Public Law 104– 13. DATES: Written comments should be submitted by January 26, 2015. ADDRESSES: You may submit comments identified by Docket No. DOT–MARAD– 2014–0146 through one of the following methods: • Federal eRulemaking Portal: http:// www.regulations.gov. Follow the online instructions for submitting comments. • Fax: 1–202–493–2251. • Mail or Hand Delivery: Docket Management Facility, U.S. Department of Transportation, 1200 New Jersey Avenue SE., West Building, Room W12– 140, Washington, DC 20590, between 9 a.m. and 5 p.m., Monday through Friday, except on Federal holidays. FOR FURTHER INFORMATION CONTACT: Elizabeth Gearhardt, 202–366–1867, Office of Shipyards and Marine Engineering, Maritime Administration 1200 New Jersey Avenue SE., Washington, DC 20590. SUPPLEMENTARY INFORMATION: OMB Control Number: 2133–0029. Title: Shipbuilding Orderbook and Shipyard Employment. Form Numbers: MA–832. Type of Review: Renewal of an information collection. SUMMARY: E:\FR\FM\26NON1.SGM 26NON1
[Federal Register Volume 79, Number 228 (Wednesday, November 26, 2014)]
[Public Notice 8954]
30-Day Notice of Proposed Information Collection: Foreign
Diplomatic Services Applications (FDSA)
ACTION: Notice of request for public comment and submission to OMB of
proposed collection of information.
SUMMARY: The Department of State has submitted the information
collection described below to the Office of Management and Budget (OMB)
for approval. In accordance with the Paperwork Reduction Act of 1995 we
are requesting comments on this
collection from all interested individuals and organizations. The
purpose of this Notice is to allow 30 days for public comment.
DATES: Submit comments directly to the Office of Management and Budget
(OMB) up to December 26, 2014.
ADDRESSES: Direct comments to the Department of State Desk Officer in
the Office of Information and Regulatory Affairs at the Office of
Management and Budget (OMB). You may submit comments by the following
Email: [email protected]. You must include the
DS form number, information collection title, and the OMB control
number in the subject line of your message.
Fax: 202-395-5806. Attention: Desk Officer for Department
of State.
FOR FURTHER INFORMATION CONTACT: Direct requests for additional
information regarding the collection listed in this notice, including
requests for copies of the proposed collection instrument and
supporting documents, to Allyson King at 3507 International Place NW.,
Washington, DC 20008, who may be reached on (202) 647-3417 or at
[email protected].
SUPPLEMENTARY INFORMATION:
Title of Information Collection: Foreign Diplomatic
Services Applications (FDSA).
OMB Control Number: 1405-0105.
Type of Request: Revision of a Currently Approved
Originating Office: M/OFM.
Form Number: DS-99, DS-98, DS-100, DS-101, DS-102, DS-104,
DS-1504, DS-1972, DS-2003, DS-2004, DS-2005, DS-2006, DS-2007, DS-2008,
DS-2003 E, DS-1972 E, DS-4138, DS-4139, DS-4140, DS-4155, DS-7675, DS-
1972 D, DS-1972 T, DS-4284, DS-4285.
Respondents: Foreign Mission Community.
Estimated Number of Respondents: 1108.
Estimated Number of Responses: 76,274 annually.
Average Time per Response: 12 minutes.
Total Estimated Burden Time: 12051.7 hours annually.
Frequency: On occasion; annually.
Obligation to Respond: Mandatory.
We are soliciting public comments to permit the Department to:
Evaluate whether the proposed information collection is
necessary for the proper functions of the Department.
Evaluate the accuracy of our estimate of the time and cost
burden for this proposed collection, including the validity of the
methodology and assumptions used.
Enhance the quality, utility, and clarity of the
information to be collected.
Minimize the reporting burden on those who are to respond,
including the use of automated collection techniques or other forms of
Please note that comments submitted in response to this Notice are
public record. Before including any detailed personal information, you
should be aware that your comments as submitted, including your
personal information, will be available for public review.
Abstract of proposed collection: Collection information instruments
dealing with information collection from the foreign mission community,
to include the electronic data compilation (e-Gov), have been combined
under one information collection request, collectively referred to as
the ``Foreign Diplomatic Services Applications''. These information
collection instruments provide M/OFM with the information necessary to
provide and administer an effective and efficient benefits, privileges,
and immunities program by which foreign missions and eligible
applicants may apply for entitled benefits from the U.S. Department of
Methodology: Information may be received via mail, fax, or
electronic submission.
Dated: November 21, 2014.
Clifton C. Seagroves,
Director, Acting, Office of Foreign Missions, Department of State.
[FR Doc. 2014-28050 Filed 11-25-14; 8:45 am] | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 2,910 | [
128000,
10156,
689,
48338,
41279,
6011,
5046,
3314,
220,
966,
56012,
25773,
315,
99983,
8245,
11348,
25,
19620,
46562,
13795,
8471,
32625,
320,
37,
73738,
705,
220,
22457,
2545,
12,
22457,
605,
510,
679,
19,
12,
11209,
1135,
933,
966,
56012,
25773,
315,
99983,
8245,
11348,
25,
19620,
46562,
13795,
8471,
32625,
320,
37,
73738,
705,
220,
22457,
2545,
12,
22457,
605,
510,
679,
19,
12,
11209,
1135,
933,
11631,
439,
11612,
296,
13787,
44466,
389,
423,
16074,
19,
53,
2898,
73061,
16,
9295,
35,
449,
4276,
16213,
12411,
8618,
611,
11119,
13,
220,
4643,
11,
2360,
13,
220,
14261,
611,
8079,
11,
6841,
220,
1627,
11,
220,
679,
19,
611,
96353,
5938,
449,
1202,
9473,
3697,
11,
449,
279,
19705,
315,
279,
19224,
3298,
11,
279,
5718
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
10156,
689,
48338,
41279,
6011,
5046,
3314,
220,
966,
56012,
25773,
315,
99983,
8245,
11348,
25,
19620,
46562,
13795,
8471,
32625,
320,
37,
73738,
705,
220,
22457,
2545,
12,
22457,
605,
510,
679,
19,
12,
11209,
1135,
933,
966,
56012,
25773,
315,
99983,
8245,
11348,
25,
19620,
46562,
13795,
8471,
32625,
320,
37,
73738,
705,
220,
22457,
2545,
12,
22457,
605,
510,
679,
19,
12,
11209,
1135,
933,
11631,
439,
11612,
296,
13787,
44466,
389,
423,
16074,
19,
53,
2898,
73061,
16,
9295,
35,
449,
4276,
16213,
12411,
8618,
611,
11119,
13,
220,
4643,
11,
2360,
13,
220,
14261,
611,
8079,
11,
6841,
220,
1627,
11,
220,
679,
19,
611,
96353,
5938,
449,
1202,
9473,
3697,
11,
449,
279,
19705,
315,
279,
19224,
3298,
11,
279,
5718,
-100
] |
Naturalist Sir David Attenborough laid out in dramatic, visual terms the challenges facing our ocean, then joining World Bank CEO Kristalina Georgieva for a fireside chat. "We wouldn't dream of managing a bank in the way we manage our oceans. Dangerously eroding our capital and losing a far higher, guaranteed return of interest," said the iconic broadcaster. Sir David encouraged policymakers to agree on targets that will stabilize the loss of nature, including in our oceans. "This is one of the crucial places in the world where these sorts of decisions can be made," he told the packed room.
The event focused on the need to address marine pollution and Ms. Georgieva urged the audience to 'reduce, reuse, recycle, refuse – and rethink" how they are using plastics. Lightning speakers followed the fireside chat. Plastic Bank founder David Katz shared how his company is seeking to make plastic waste a currency that transcends poverty while also stopping the flow of plastic into the ocean. Advocacy group Global Citizen outlined their efforts to stem plastic pollution, accompanied by Chilean entrepreneur Thomas Kimber who founded a sustainable eyewear brand. A dynamic panel featuring ministers from Thailand, Norway and Canada, along with PepsiCo 's Vice President for Global Sustainability, Roberta Barbieri, and the UN's Special Envoy for the Ocean, Ambassador Peter Thomson, then discussed global efforts to curb marine pollution. World Bank Vice President for Sustainable Development, Laura Tuck, wrapped up the event, saying the issue should be tackled from all angles, curbing plastic leakage at source … to improving waste management and ensuring a circular economy approach. "Let's go", she implored the audience at the close of the event. | {
"redpajama_set_name": "RedPajamaC4"
} | 4,049 | [
128000,
55381,
380,
17177,
6941,
2468,
2002,
35179,
17551,
704,
304,
22520,
11,
9302,
3878,
279,
11774,
13176,
1057,
18435,
11,
1243,
18667,
4435,
8715,
12432,
27973,
278,
2259,
13629,
648,
6723,
369,
264,
27176,
579,
6369,
13,
330,
1687,
8434,
956,
8063,
315,
18646,
264,
6201,
304,
279,
1648,
584,
10299,
1057,
54280,
13,
48399,
7162,
2781,
3785,
1057,
6864,
323,
13490,
264,
3117,
5190,
11,
19883,
471,
315,
2802,
1359,
1071,
279,
27373,
60983,
13,
17177,
6941,
21190,
70978,
311,
7655,
389,
11811,
430,
690,
70236,
279,
4814,
315,
7138,
11,
2737,
304,
1057,
54280,
13,
330,
2028,
374,
832,
315,
279,
16996,
7634,
304,
279,
1917,
1405,
1521,
21522,
315,
11429,
649,
387,
1903,
1359,
568,
3309,
279,
19937,
3130,
627,
791,
1567,
10968,
389
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
55381,
380,
17177,
6941,
2468,
2002,
35179,
17551,
704,
304,
22520,
11,
9302,
3878,
279,
11774,
13176,
1057,
18435,
11,
1243,
18667,
4435,
8715,
12432,
27973,
278,
2259,
13629,
648,
6723,
369,
264,
27176,
579,
6369,
13,
330,
1687,
8434,
956,
8063,
315,
18646,
264,
6201,
304,
279,
1648,
584,
10299,
1057,
54280,
13,
48399,
7162,
2781,
3785,
1057,
6864,
323,
13490,
264,
3117,
5190,
11,
19883,
471,
315,
2802,
1359,
1071,
279,
27373,
60983,
13,
17177,
6941,
21190,
70978,
311,
7655,
389,
11811,
430,
690,
70236,
279,
4814,
315,
7138,
11,
2737,
304,
1057,
54280,
13,
330,
2028,
374,
832,
315,
279,
16996,
7634,
304,
279,
1917,
1405,
1521,
21522,
315,
11429,
649,
387,
1903,
1359,
568,
3309,
279,
19937,
3130,
627,
791,
1567,
10968,
389,
-100
] |
Frozen Water Line For Sprinkler System Bursts In Queens
A frozen water line can occur during an extreme Winter cold spell. In an unoccupied building, the freeze-thaw cycle can result in undetected flooding and extreme damage from a burst water line. Unoccupied buildings are the most common to suffer from a frozen water line. This is because new construction, summer homes, and buildings scheduled for renovation or demolition typically have no heat. In many cases the do not have any sort of insulation either. Needless to say, they are also often left unattended for long periods of time.
The Winter of 2016 seemed to be the mildest Winter in recent memory. However, even with that in mind, many properties suffered from a frozen water line. One particular building, located in Jamaica Queens, suffered extreme flooding as a result.
Frozen and burst pipes
Case study: A frozen water line in Jamaica, Queens
Jamaica Queens, like many areas of New York City, is undergoing a revitalization. Located near JFK Airport, and all major forms of transportation, Jamaica is being rediscovered. Large commercial properties that had been vacate for awhile are being renovated, or demolished and rebuilt. One particular property on 89th Avenue scheduled for demolition had its fire protection system left intact, as is the typical code requirement in NYC. Unfortunately, no effort was made to winterize it, or protect it against freezing.
Frozen and split OS&Y valve
To understand the resulting damage, one must first understand that the typical size of a public main water line under a Queens roadway is 8″. That was the same size of the fire service line for this one building in question. As the ice built up inside the 8″ fire main piping, it slowly pushed down the pipe, until it came up against the gate inside the OS&Y main shut off valve. The ice continued its expansion, pushing through the gate inside the valve. Eventually the ice expansion broke through the side wall of the valve body itself. Different water valves serve different purposes, but an OS&Y valve is required for fire service mains. No matter the valve installed, under these conditions it would have failed.
Like many cases of a frozen water line, there was no sign of a leak as long as the line remained frozen. Likewise there was no sign of a loss of service because the building was not occupied. However when the thaw cycle hit, the continuous rush of water from the 8″ line was enormous. It was the equivalent of a typical NYC water main left broken in 1/2 and unattended. The entire building filled with many feet of water.
Response for a frozen water line providing fire protection
Even after pumping, severe damage is still evident
Of course everyone knows that when a water line freezes and bursts, the water has to be shut off quickly. But what many people do not realize, is that unless a building is in very specific compliance with the FDNY and Department of Buildings, the fire protection system must be left active. So in this particular case, the water could not simply be shut off. The 8″ fire main in this building had to be repaired to code, inspected, and left open.
To be clear, even if the fire system inside a building is damaged or leaking, a water main contractor is still obligated to leave the fire main itself on, and operational. It is the responsibility of the owner of the building to protect the system from future damage, and to be code compliant. When it involves fire protection, the penalties for non-compliance can range from fines, to license revocation, to criminal penalties. One should never cut any corners when it involves a fire protection system, and the resulting exposure from being in non-compliance.
Demolition of building in Jamaica, NY | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 251 | [
128000,
92418,
10164,
7228,
1789,
15883,
771,
1565,
744,
12649,
37379,
763,
28162,
198,
32,
20268,
3090,
1584,
649,
12446,
2391,
459,
14560,
20704,
9439,
13141,
13,
763,
459,
653,
41456,
4857,
11,
279,
31030,
7716,
675,
11008,
649,
1121,
304,
2073,
295,
1599,
39262,
323,
14560,
5674,
505,
264,
21165,
3090,
1584,
13,
1252,
41456,
14016,
527,
279,
1455,
4279,
311,
7831,
505,
264,
20268,
3090,
1584,
13,
1115,
374,
1606,
502,
8246,
11,
7474,
10632,
11,
323,
14016,
13847,
369,
50555,
477,
61698,
11383,
617,
912,
8798,
13,
763,
1690,
5157,
279,
656,
539,
617,
904,
3460,
315,
49117,
3060,
13,
83383,
311,
2019,
11,
814,
527,
1101,
3629,
2163,
653,
86006,
369,
1317,
18852,
315,
892,
627,
791,
20704,
315,
220,
679,
21,
9508,
311
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
92418,
10164,
7228,
1789,
15883,
771,
1565,
744,
12649,
37379,
763,
28162,
198,
32,
20268,
3090,
1584,
649,
12446,
2391,
459,
14560,
20704,
9439,
13141,
13,
763,
459,
653,
41456,
4857,
11,
279,
31030,
7716,
675,
11008,
649,
1121,
304,
2073,
295,
1599,
39262,
323,
14560,
5674,
505,
264,
21165,
3090,
1584,
13,
1252,
41456,
14016,
527,
279,
1455,
4279,
311,
7831,
505,
264,
20268,
3090,
1584,
13,
1115,
374,
1606,
502,
8246,
11,
7474,
10632,
11,
323,
14016,
13847,
369,
50555,
477,
61698,
11383,
617,
912,
8798,
13,
763,
1690,
5157,
279,
656,
539,
617,
904,
3460,
315,
49117,
3060,
13,
83383,
311,
2019,
11,
814,
527,
1101,
3629,
2163,
653,
86006,
369,
1317,
18852,
315,
892,
627,
791,
20704,
315,
220,
679,
21,
9508,
311,
-100
] |
Presenting the List of 5 Best & popular C++ IDE. As we know Our favorite IDE or code editor can become an unparalleled ally when it comes to code completion and visual assistance for debugging and building our app. IDEs are fancy text editors with tools and inspections regarding programming languages. Every IDE is good to do something and probably bad to do something else.
C++ is the very popular Programming language and still actively used across applications and systems worldwide. Choosing a Best C++ IDE depends on what you are developing and of course which OS you are using. There are many IDE's but you must select the right one. That being said, let's highlight 5 Best C++ IDE and take a bird's eye view of how each one of them can ease your C++ app development.
Clion is a powerful & a cross-platform IDE for C and C++ by JetBrains. Clion is the bit quicker in processing than any other IDE. The variable values while debugging is shown right next to them (which is great) whereas in eclipse there is a separate window in Eclipse. CLion knows your code through and through and takes care of the routine while you focus on the important things.
Real-time analysis of your code: You get real-time feedback of the potential errors in your code.
An integrated debugger among other things.
Eclipse is also one of the most popular C++ IDE. Eclipse UI is great, you can have multiple projects in the IDE's project tab. You can see the code of different project in the same window without switching the IDE perspective. It has a different debugging perspective (view). It has a lot of plugins. This is the choice if you are a budding developer.
Open source which is big, plus and completely free.
syntax highlighting, debugger, and auto code completion.
Code:: Blocks IDE The open source, cross-platform, free IDE, It is designed to be very extensible and fully configurable. It is Built around a plugin framework, Code:: Blocks can be extended with plugins. Any kind of functionality can be added by installing/coding a plugin. For instance, compiling and debugging functionality is already provided by plugins.
Multiple compiler support such as GCC (MingW / GNU GCC), MSVC++,clang, Digital Mars, Borland C++ 5.5 & Open Watcom.
Code folding for C, C++, Fortran, XML, and many more files.
NetBeans is an open-source Integrated Development Environment written in Java. NetBeans is an excellent C++ IDE, NetBeans is modular in design meaning it can be extended by third-party developers who can create plugins for NetBeans to enhance its functionality.
The C++11 features are available in the editor, code assistance, navigation, and project system.
The NetBeans IDE supports a variety of leading compilers, such as the Oracle Solaris Studio, GNU, CLang/LLVM, Cygwin, and MinGW compilers.
Visual Studio is an IDE from Microsoft. This IDE is not only for C/C++ developers, but it also includes many popular languages in its list. If you are working with a team then you probably do need a Pro version minimum which is not free. But if you are working alone then you can use Express edition of IDE which is free.
support for C++11, C++14 and some C++17 features with market-leading performance, build throughput and security.
You can Break All at any time, Step Overstatements, Step Into and Out of functions, Run To Cursor, Edit and Continue, set Breakpoints.
Quickly and easily refactor existing code, explore code definitions and navigate through files. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,716 | [
128000,
21886,
287,
279,
1796,
315,
220,
20,
7252,
612,
5526,
356,
1044,
29075,
13,
1666,
584,
1440,
5751,
7075,
29075,
477,
2082,
6576,
649,
3719,
459,
71257,
31953,
994,
433,
4131,
311,
2082,
9954,
323,
9302,
13291,
369,
28803,
323,
4857,
1057,
917,
13,
29075,
82,
527,
27555,
1495,
29846,
449,
7526,
323,
58074,
9002,
15840,
15823,
13,
7357,
29075,
374,
1695,
311,
656,
2555,
323,
4762,
3958,
311,
656,
2555,
775,
627,
34,
1044,
374,
279,
1633,
5526,
39524,
4221,
323,
2103,
22815,
1511,
4028,
8522,
323,
6067,
15603,
13,
77351,
264,
7252,
356,
1044,
29075,
14117,
389,
1148,
499,
527,
11469,
323,
315,
3388,
902,
10293,
499,
527,
1701,
13,
2684,
527,
1690,
29075,
596,
719,
499,
2011,
3373,
279,
1314,
832,
13,
3011,
1694
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
21886,
287,
279,
1796,
315,
220,
20,
7252,
612,
5526,
356,
1044,
29075,
13,
1666,
584,
1440,
5751,
7075,
29075,
477,
2082,
6576,
649,
3719,
459,
71257,
31953,
994,
433,
4131,
311,
2082,
9954,
323,
9302,
13291,
369,
28803,
323,
4857,
1057,
917,
13,
29075,
82,
527,
27555,
1495,
29846,
449,
7526,
323,
58074,
9002,
15840,
15823,
13,
7357,
29075,
374,
1695,
311,
656,
2555,
323,
4762,
3958,
311,
656,
2555,
775,
627,
34,
1044,
374,
279,
1633,
5526,
39524,
4221,
323,
2103,
22815,
1511,
4028,
8522,
323,
6067,
15603,
13,
77351,
264,
7252,
356,
1044,
29075,
14117,
389,
1148,
499,
527,
11469,
323,
315,
3388,
902,
10293,
499,
527,
1701,
13,
2684,
527,
1690,
29075,
596,
719,
499,
2011,
3373,
279,
1314,
832,
13,
3011,
1694,
-100
] |
Q: Trouble with output for Fantasy Game Inventory I'm a beginner working on the Automate the boring stuff with Python book. I'm stuck on this practice problem. The instructions are as follows:
List to Dictionary Function for Fantasy Game Inventory:
Imagine that a vanquished dragon's loot is represented as a list of strings
like this:
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
Write a function named addToInventory(inventory, addedItems), where the
inventory parameter is a dictionary representing the player's inventory (like
in the previous project) and the addedItems parameter is a list like dragonLoot. The addToInventory() function should return a dictionary that represents the updated inventory. Note that the addedItems list can contain multiples of the same item. Your code could look something like this:
def addToInventory(inventory, addedItems):
inv = {'gold coin': 42, 'rope': 1}
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
inv = addToInventory(inv, dragonLoot)
displayInventory(inv)
The previous program (with your displayInventory() function from the
previous project) would output the following:
Inventory:
45 gold coin
1 rope
1 ruby
1 dagger
Total number of items: 48
My code is as follows
def addtoinventory(inventory,lootlist):
for i in range(len(lootlist)):
if lootlist[i] in inventory:
inventory[lootlist[i]] = inventory[lootlist[i]] + 1
else:
inventory.setdefault(lootlist[i],1)
return inventory
def displayinventory(inventory):
total_items = 0
for k,v in inventory.items():
print(k + ' : ' + str(v))
total_items = total_items + v
print("Total number of items: " + str(total_items))
inv = {'gold coin': 42, 'rope': 1}
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
inv = addtoinventory(inv, dragonLoot)
displayinventory(inv)
My output is like this:
gold coin : 45
ruby : 1
rope : 1
Total number of items: 47
What am I doing wrong?
A: I think your indent of else: is wrong. You should use if-else, but your code is for-else. The code below works well.
def addtoinventory(inventory,lootlist):
for i in range(len(lootlist)):
if lootlist[i] in inventory:
inventory[lootlist[i]] = inventory[lootlist[i]] + 1
else:
inventory.setdefault(lootlist[i],1)
return inventory
The result is below.
>>> inv = {'gold coin': 42, 'rope': 1}
>>> dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
>>> inv = addtoinventory(inv, dragonLoot)
>>> inv
{'gold coin': 45, 'rope': 1, 'dagger': 1, 'ruby': 1}
A: I copied your code and it worked just fine for me, apart from the items and their numbers being in the wrong order, which is easily fixed if you change the print line to this:
print(str(v)+' : '+k)
A: This is how I solved it. I wasn't able to get rid of the brackets though, and for some reason the pprint didn't work. But this code serves the purpose anyway...
inv = {'gold coin': 42, 'rope': 1}
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
#Turn dragonLoot list in to a dictionary:
list={}
for i in dragonLoot:
if i not in list:
list.setdefault(i, 1)
elif i in list:
list[i] = list[i] +1
#Merge dictionaries:
for i, v in list.items():
if i not in inv:
inv.setdefault(i, 1)
elif i in inv:
inv[i]=inv[i]+v
import pprint
print('Inventory: ')
pprint.pprint(inv, width=1)
print('')
total=0
#Count the total number of items:
for i, v in inv.items():
total=total+v
print('Total number of items: ' + str(total))
A: def displayInventory(inventory):
print("Inventory:")
item_total = 0
for k, v in inventory.items():
item_total += v
print(str(v) + ' ' + str(k))
print("Total number of items: " + str(item_total))
def addToInventory(inventory, addItems):
for k in range(len(addItems)):
inventory.setdefault(addItems[k], 0)
inventory[addItems[k]] += 1
return(inventory)
inventory = {'rope': 1, 'torches': 6, 'gold coins': 42, 'daggers': 28, 'arrows': 12, 'knives': 50}
dragonLoot = ['gold coins', 'daggers', 'gold coins', 'gold coins', 'ruby']
updatedInventory = addToInventory(inventory, dragonLoot)
displayInventory(updatedInventory)
print("Inventory updated.")
A: Try the following:
def addToInventory(dragonLoot,inv):
count={}
for item in dragonLoot:
count.setdefault(item,0)
count[item]=count[item]+1
for k in count.keys():
if k in inv.keys():
inv[k]=inv[k]+count[k]
print(inv)
A: You're searching for range in Dictionary and your code has issues with unexpected indent
playerInventory = {'rope': 1, 'torch': 6, 'gold coin': 42, 'dagger': 1, 'arrow': 12}
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
def addToInventory(inventory, addedItems):
for i in addedItems:
if i not in inventory:
inventory.setdefault (str(i), 1)
else:
inventory[i] = inventory[i] + 1
return inventory
playerInventory = addToInventory(playerInventory, dragonLoot)
print(playerInventory)
A: i just got into the book and here how I solved it, seems pretty simple:
inv = {'gold coin': 42, 'rope': 1}
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
def addToInventory(backpack, added_items):
for i in added_items:
if i in backpack:
backpack[i] += 1
else:
count = 0
count += 1
backpack[i] = count
return backpack
A: inv = {'gold coin': 42, 'rope': 1}
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
def addToInventory(inventory, addedItems):
for i in range(len(addedItems)):
if addedItems[i] in inventory:
inventory[addedItems[i]] = inventory[addedItems[i]] + 1
else:
inventory.setdefault(addedItems[i],1)
return inventory
inv = addToInventory(inv, dragonLoot)
displayInventory(inv)
A: Here's my solution:
# inventory.py
# stuff = {'rope': 1, 'torch': 6, 'gold coin': 42, 'dagger': 1, 'arrow': 12}
def displayInventory(inventory):
print("Inventory:")
item_total = 0
for k, v in inventory.items():
print(str(v) + ' ' + k)
item_total += v
print("Total number of items: " + str(item_total))
def addToInventory(inventory, addedItems):
for i in addedItems:
#copy() is for to avoid RuntimeError: dictionary changed size during iteration
for k, v in inventory.copy().items():
if k == i:
inventory[k] = v + 1
if i not in inventory.keys():
inventory[i] = 1
return inventory
inv = {'gold coin': 42, 'rope': 1}
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
inv = addToInventory(inv, dragonLoot)
displayInventory(inv)
# displayInventory(stuff)
A: This is how I figured it out. wanted to share since is the first one I did without help. hope it helps and all feedback is welcome.
`
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
inv = {'gold coin':42, 'rope': 1}
def addToInventory(inventory, addedItems):
for loot in addedItems:
inventory.setdefault(loot, 0)
for k, v in inventory.items():
if loot == k:
inventory[loot] = v + 1
def displayInventory(inventory):
totalItems = 0
for k, v in inventory.items():
print(str(v) + '---' + str(k))
totalItems += v
print('Total number of items: '+ str(totalItems))
addToInventory(inv, dragonLoot)
displayInventory(inv)
`
A: This is how i did it. I think this is a clean solution for the addToInventory() function. What do you think? Or did i missed something?
PlayerInventory = {"gold coin": 42, "rope": 1}
dragonLoot = ["gold coin", "dagger", "gold coin", "gold coin", "ruby"]
def displayInventory(inventory): # Displays the Inventory
print("Inventory:")
cnt = 0
for k, v in inventory.items():
print(k + " : " + str(v))
cnt += v
print(f"Total number of items: {cnt}")
def addToInventory(inventory, addedItems): # Add items to the provided inventory
for item in addedItems: # Loops trough the provided list.
inventory.setdefault(item, 0) # Checks if the key exists. If not, adds it with a value of 0.
inventory[item] += 1 # Adds 1 to the value.
return inventory # returns the complete Dictionary
PlayerInventory = addToInventory(PlayerInventory, dragonLoot)
displayInventory(PlayerInventory)
A: def add(inventory,items):
for j in items:
for i ,k in inventory.copy().items():
if i==j:
inventory[i]=k+1
else:
inventory.setdefault(j,1)
print(inventory)
inv = {'gold coin': 42, 'rope': 1}
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
add(inv,dragonLoot)
I think this will be the best approach
A: from collections import Counter
inv = {'gold coin': 42, 'rope': 1}
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
dl = (dict(Counter(dragonLoot)))
def addToInventory(inventory, addedItems):
for key, v in addedItems.items():
if key not in inventory:
inventory.setdefault(key, 1)
elif key in inventory:
inventory[key] = inventory[key] + v
return inventory
addToInventory(inv,dl)
print(inv)
A: One important thing to note about this exercise is that it uses the function of the previous exercise and the output given on that exercise contains plural forms of items in inventory depending on the number of items so here is my version of the two exercises which follow the rules I use the inflect module for converting words to plural from Here Is The Code:
import inflect #for plural forms of items in inventory
p = inflect.engine()
stuff = {'rope': 1, 'torch': 6, 'gold coin': 42, 'dagger': 1, 'arrow': 12}
def displayInventory(inventory): #this is the previous exercise as we need this function to do this exercise
print("Inventory:")
item_total = 0
for k, v in inventory.items():
if v > 1: #'v' is huch of given item there is
key = p.plural(k) #if there is more than 1 of the given item 'k' converts it into plural form
else:
key = k #if there is only 1 of the item then no need for plural form
print('' + str(v) + ' ' + key ) #prints the number of items + the item name example: 12 torches or 1 ruby
item_total += v #v is added to item_total
print("Total number of items: " + str(item_total))
inv = {'gold coin': 42, 'rope': 1}
dragonLoot = ['gold coin', 'dagger', 'gold coin', 'gold coin', 'ruby']
def addToInventory(inventory, addedItems):
for k in addedItems: #loops over the valus in the list addedItems which is dragonLoot in this case
if k in inventory.keys(): #if the current value of k is in the keys of inventory which is inv in this case the following code is executed this means that the dragons loot has the item 'k'
inventory[k] += 1 # 1 is added to the the key value of 'k' this means that the user got 1 more of the loot item
else:
inventory.setdefault(k, 1) # if k is not in the inventory then k is added to it and the value is set to 1
return inventory #then the edited inventory dict is returned
inv = addToInventory(inv, dragonLoot) # the function is called on inv and dragonLoot
displayInventory(inv) #the displayInventory fuction is called on inv dict
I hope this code works fine as I'm also a beginner "Thank You"
A: items={'rope': 1, 'torch': 6, 'gold coin': 42, 'dagger': 1, 'arrow': 12}
def displayInventory(*inventory):
total_items = 0
for i, j in items.items():
print(j, i)
total_items += j
print("Total number of items: " + str(total_items))
displayInventory()
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 6,436 | [
128000,
48,
25,
81363,
449,
2612,
369,
27582,
4140,
29226,
358,
2846,
264,
50048,
3318,
389,
279,
20319,
349,
279,
28859,
6392,
449,
13325,
2363,
13,
358,
2846,
16075,
389,
420,
6725,
3575,
13,
578,
11470,
527,
439,
11263,
512,
861,
311,
10685,
5830,
369,
27582,
4140,
29226,
512,
52157,
430,
264,
5355,
447,
3384,
26161,
596,
46403,
374,
15609,
439,
264,
1160,
315,
9246,
198,
4908,
420,
512,
56519,
43,
1944,
284,
2570,
35637,
16652,
518,
364,
67,
10322,
518,
364,
35637,
16652,
518,
364,
35637,
16652,
518,
364,
47375,
16049,
8144,
264,
734,
7086,
54517,
23120,
6024,
7371,
11,
3779,
4451,
705,
1405,
279,
198,
32193,
5852,
374,
264,
11240,
14393,
279,
2851,
596,
15808,
320,
4908,
198,
258,
279,
3766,
2447,
8,
323,
279,
3779
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48,
25,
81363,
449,
2612,
369,
27582,
4140,
29226,
358,
2846,
264,
50048,
3318,
389,
279,
20319,
349,
279,
28859,
6392,
449,
13325,
2363,
13,
358,
2846,
16075,
389,
420,
6725,
3575,
13,
578,
11470,
527,
439,
11263,
512,
861,
311,
10685,
5830,
369,
27582,
4140,
29226,
512,
52157,
430,
264,
5355,
447,
3384,
26161,
596,
46403,
374,
15609,
439,
264,
1160,
315,
9246,
198,
4908,
420,
512,
56519,
43,
1944,
284,
2570,
35637,
16652,
518,
364,
67,
10322,
518,
364,
35637,
16652,
518,
364,
35637,
16652,
518,
364,
47375,
16049,
8144,
264,
734,
7086,
54517,
23120,
6024,
7371,
11,
3779,
4451,
705,
1405,
279,
198,
32193,
5852,
374,
264,
11240,
14393,
279,
2851,
596,
15808,
320,
4908,
198,
258,
279,
3766,
2447,
8,
323,
279,
3779,
-100
] |
Renovation Challenges Involve the Question of When a Tenant Must Provide Vacant Possession to a Landlord
Print Version (PDF) Home / Services / / Renovictions
Does a Tenant Need to Leave During Renovations?
A Renovation Legally Requiring a Building Permit Generally Indicates That a Tenant Needs to Move Out Until Work Is Done.
A Helpful Guide For How to Understand What May Be An Unlawful Renoviction As Eviction For Renovation Without Rights to Return
Imagine the situation where a landlord learns that the rental complex requires renovations to meet the Building Code Act, 1992, S.O. 1992, Chapter 23; however, the units are currently rented. What can the landlord do? Firstly, the landlord must appreciate the statutory rights of the tenants; whereas, in general, tenants have the right to resume living in the building following completion of the renovations and the landlord is unable to increase the rent as a result of the renovations (unless granted permission from the Landlord Tenant Board). To assist in the right to reoccupy process, tenants must give written notice of an intention to reoccupy the unit following the renovations and must also provide written notice of an intended temporary address.
How Extensive Is the Renovation?
The intended repair and renovation work must be significant as it must be a sufficient enough renovation as to displace the tenants while the work takes place. On this point, in the matter of [Landlord] v. [Tenant], 2011 CanLII 101419 (ON LTB), the renovations were found as without the significance necessary to require the tenants to vacate the premises whereas the intended renovation was without need of a building permit and thereby deemed insignificant.
In this situation, the landlord was previously ordered by a building inspector to carry out several changes to the house, which was rented, including removing walls, kitchens, and laundry areas. Of the three units, two units were already vacant and much of the repairs to those units were already complete. However, in the third unit, the tenants fought to stay. The matter was brought to the Landlord Tenant Board and the legal issue for adjudication was whether the landlord required vacant possession in order to complete the work; essentially, whether the tenants needed to leave while the renovation work was performed.
The renovation work that remained outstanding, being for the remaining third unit, included sealing an entrance, constructing a balcony, and building a closet. The legal test that the Landlord Tenant Board adjudicator applied is found in section 50(1) of the Residential Tenancies Act, 2006, S.O. 2006, Chapter 17, which states:
Residential Tenancies Act, 2006,S.O. 2006, Chapter 17 at section 50(1)
50 (1) A landlord may give notice of termination of a tenancy if the landlord requires possession of the rental unit in order to,
(a) demolish it;
(b) convert it to use for a purpose other than residential premises; or
(c) do repairs or renovations to it that are so extensive that they require a building permit and vacant possession of the rental unit.
In the [Landlord] v. [Tenant] matter as above, both (a) and (b) were irrelevant. The adjudicator at the Landlord Tenant Board focused on (c) which requires that a building permit be required to do the work at issue and therefore that the work is significant enough that vacant possession is required. It was already known that repairs and renovations were necessary whereas the landlord was ordered to carry such repairs and renovations by the local building inspector; however, what still needed determination was whether vacant possession, meaning displacement of the tenants, was necessary to enable the repairs and renovations.
Within the testimony of the landlord, the landlord cited concerns of noise, dust, and safety hazards for the tenants; however, the landlord failed to adequately persuade the Landlord Tenant Board adjudicator that such were significant concerns whereas the landlord testified that the repairs were relatively minor in nature and the landlord also failed to provide any evidence (eg. a general contractor testifying) to support the viewpoint. Furthermore, the landlord indicated to the Landlord Tenant Board that the landlord wished to increase the rent following the renovations; and accordingly, the Landlord Tenant Board adjudicator remarked that, "This evidence does not establish that vacant possession is necessary for the renovations to be completed as much as it indicates that the Landlords have an ulterior motive for wanting the Tenants to leave."
Ultimately, the adjudicator determined that the landlord lacked the need of vacant possession because the required renovation work was relatively minor in nature and the tenants were willing to accept the anticipated disturbances.
The term renoviction suggests that renovation work was used as an excuse to evict a tenant without providing the tenant with notice of an option to return following completion of the renovation work.
Defend-It Legal Services provides affordable services as a Paralegal in Pickering, Whitby, Vaughan, Oshawa, Scarborough, among other places!
Application to Evict for Own Use; Requires Good Faith Intention of the ...
Determining Residential Use or Commercial Use; Involves the Review of ...
Allegation Particulars; Required Within Landlord Tenant Board ...
Exclusivity of Jurisdiction; Requires That Certain Issues In Dispute Be ...
Express Limitation Periods; Involve Strict Time Restrictions Within ...
Defend-It Legal Services serves clients located in Pickering, Richmond Hill, Toronto, Courtice, Ajax, among other places.CALL: (289) 275-3513
Do You Need to Address a Legal Matter? Get Legal Help Now.
Contact Defend-It Legal Services
For more information, fill out the form below to send a direct inquiry to Defend-It Legal Services
ATTENTION: Confidential details about your case must not be sent through this website. Use of this website does not establish a legal-representative/client relationship. Do not include confidential details about your case by email or phone. Use this website only for an introduction with a Defend-It Legal Services representative.
Unfortunately, what many people forget is that judges are just lawyers in robes.
~ Tammy Bruce
Defend-It Legal Services Professional Corporation is a Paralegal entity operating/marketed brandname, and is licenced by the Law Society of Ontario to provide legal services addressing particular legal issues within the permissible scope of the licence of a licensed Paralegal; and which to some measure, may involve Immigration Law, Tort Law, Criminal Law (Summary), Business & Commerce, Residential Tenancies, Provincial Offences, Consumer Law, Criminal Law, Worker Injury Law, Administrative Law, Employment Law, and Human Rights issues, within the Province of Ontario, Canada. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 1,562 | [
128000,
35725,
23723,
69778,
19337,
4035,
279,
16225,
315,
3277,
264,
74824,
15832,
40665,
31626,
519,
42145,
1362,
311,
264,
11680,
26680,
198,
9171,
6207,
320,
24317,
8,
5492,
611,
8471,
611,
611,
14094,
869,
22155,
198,
22186,
264,
74824,
14998,
311,
26257,
12220,
14094,
869,
811,
5380,
32,
14094,
23723,
7765,
750,
1050,
71194,
264,
17283,
81739,
44493,
45367,
3011,
264,
74824,
44240,
311,
14903,
4470,
30070,
5664,
2209,
28457,
627,
32,
47654,
13002,
1789,
2650,
311,
71994,
3639,
3297,
2893,
1556,
1252,
20510,
1285,
14094,
869,
2538,
1666,
10641,
2538,
1789,
14094,
23723,
17586,
10734,
311,
3494,
198,
52157,
279,
6671,
1405,
264,
41247,
47310,
430,
279,
19160,
6485,
7612,
78664,
311,
3449,
279,
17283,
6247,
3298,
11,
220,
2550,
17,
11,
328,
8548,
13,
220
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
35725,
23723,
69778,
19337,
4035,
279,
16225,
315,
3277,
264,
74824,
15832,
40665,
31626,
519,
42145,
1362,
311,
264,
11680,
26680,
198,
9171,
6207,
320,
24317,
8,
5492,
611,
8471,
611,
611,
14094,
869,
22155,
198,
22186,
264,
74824,
14998,
311,
26257,
12220,
14094,
869,
811,
5380,
32,
14094,
23723,
7765,
750,
1050,
71194,
264,
17283,
81739,
44493,
45367,
3011,
264,
74824,
44240,
311,
14903,
4470,
30070,
5664,
2209,
28457,
627,
32,
47654,
13002,
1789,
2650,
311,
71994,
3639,
3297,
2893,
1556,
1252,
20510,
1285,
14094,
869,
2538,
1666,
10641,
2538,
1789,
14094,
23723,
17586,
10734,
311,
3494,
198,
52157,
279,
6671,
1405,
264,
41247,
47310,
430,
279,
19160,
6485,
7612,
78664,
311,
3449,
279,
17283,
6247,
3298,
11,
220,
2550,
17,
11,
328,
8548,
13,
220,
-100
] |
Tired of looking bad online? Atilus has helped hundreds of clients impress customers and improve their online reputation through custom website design and development services.
Web Design: Our team of meticulous designers has the skill and creativity to provide you with a beautiful and functional representation of your company.
Content/Copywriting: Our writers can create content and additional copy for your website that will fall in line with your brand and your website.
Logo Creation: Let us create a logo that will leave a long-lasting impression on your current and future clients and customers.
User Interface/Usability: We know what users are looking for in a website. Leave it to us to provide a design that leaves your visitors with a satisfying user experience.
Photography: We can provide you with high-quality photos that are optimized for viewing on your website.
E-Commerce & Shopping Cart Integration: We offer custom-built e-commerce solutions that will provide a convenient, secure, and hassle-free shopping experience for your customers.
Blog Integration: We can implement a blog on your website to both engage with customers and improve your search engine rankings.
Database Architecture: If you're looking to create or maintain a database-driven or membership-driven website, our team of developers will handle it all from start to finish.
Media Integration: Our developers will ensure that your website is equipped with the most updated media, from video embedding to social media feed integration.
Calendar: If your organization is event-oriented, we will implement a custom calendar to display all upcoming events for your visitors.
SSL Security: Our team of developers will ensure that all of your online messages are transmitted securely with no risk.
Payment API: If you're struggling to accept payments for products and services on your website, our developers can integrate the perfect payment solution.
Forms: Make it easy for customers to contact you with our customized forms that will ensure you never miss a correspondence (or potential sale). | {
"redpajama_set_name": "RedPajamaC4"
} | 5,669 | [
128000,
51,
2757,
315,
3411,
3958,
2930,
30,
362,
1678,
355,
706,
9087,
11758,
315,
8403,
10098,
6444,
323,
7417,
872,
2930,
17444,
1555,
2587,
3997,
2955,
323,
4500,
3600,
627,
6109,
7127,
25,
5751,
2128,
315,
96278,
26897,
706,
279,
10151,
323,
28697,
311,
3493,
499,
449,
264,
6366,
323,
16003,
13340,
315,
701,
2883,
627,
2831,
11547,
1289,
26372,
25,
5751,
16483,
649,
1893,
2262,
323,
5217,
3048,
369,
701,
3997,
430,
690,
4498,
304,
1584,
449,
701,
6883,
323,
701,
3997,
627,
28683,
35386,
25,
6914,
603,
1893,
264,
12708,
430,
690,
5387,
264,
1317,
65265,
21455,
389,
701,
1510,
323,
3938,
8403,
323,
6444,
627,
1502,
20620,
14,
3642,
2968,
25,
1226,
1440,
1148,
3932,
527,
3411,
369,
304,
264,
3997,
13,
26257,
433
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
51,
2757,
315,
3411,
3958,
2930,
30,
362,
1678,
355,
706,
9087,
11758,
315,
8403,
10098,
6444,
323,
7417,
872,
2930,
17444,
1555,
2587,
3997,
2955,
323,
4500,
3600,
627,
6109,
7127,
25,
5751,
2128,
315,
96278,
26897,
706,
279,
10151,
323,
28697,
311,
3493,
499,
449,
264,
6366,
323,
16003,
13340,
315,
701,
2883,
627,
2831,
11547,
1289,
26372,
25,
5751,
16483,
649,
1893,
2262,
323,
5217,
3048,
369,
701,
3997,
430,
690,
4498,
304,
1584,
449,
701,
6883,
323,
701,
3997,
627,
28683,
35386,
25,
6914,
603,
1893,
264,
12708,
430,
690,
5387,
264,
1317,
65265,
21455,
389,
701,
1510,
323,
3938,
8403,
323,
6444,
627,
1502,
20620,
14,
3642,
2968,
25,
1226,
1440,
1148,
3932,
527,
3411,
369,
304,
264,
3997,
13,
26257,
433,
-100
] |
The Dremel 3000 is the result of upgrading one of Dremel's most popular rotary tools. The tool features the EZ Twist™ nose cap with an integrated wrench that allows the nose cap to be used as a wrench to tighten accessories and eliminates the need for a separate wrench. Another model upgrade is a more efficient fan design and side vents that provide a cooler running tool, making it comfortable for extended periods of use. The 3000 also features a symmetrical design including a trumpet-shaped nose cap to facilitate a pencil-grip tool hold. You also have the ability to use all existing Dremel accessories and most attachments. All of these features and more combine so you can efficiently complete a wide range of applications, including cutting, grinding, sanding, carving and polishing.
• Variable speed from 5,000 to 32,000 RPM; Length: 7-1/2"; Weight: 1-1/4 lbs.
Includes: Dremel 3000 Variable Speed Rotary Tool, Sanding/Grinding Guide Attachment, EZ600A EZ Twist Nose Cap, 191 - High Speed Cutter, 401 - Mandrel, 402 - Mandrel, 403 - Bristle Brush, 407 - Coarse 1/2" Sanding Drum, 408 - 1/2" 60-Grit Sanding Band, 414 - 1/2" Felt Polishing Wheel (x2), 415 - Dressing Stone, 421 - Polishing Compound, 426 - 1-1/4" Cut-Off Wheel (2), 428 - 3/4" Carbon Steel Brush, 429 - 1" Felt Polishing Wheel, 430 - 1/4" 60 Grit Sanding Band with Mandrel, 432 - 1/2" 120-Grit Sanding Band (x2), 438 - 1/4" 120-Grit Sanding Band, 445 - 1/2" 240-Grit Sanding Band (x2), 446 - 1/4" 240-Grit Sanding Band, 85422 - Silicon Carbide Grinding Stone, 932 & 952 - Aluminum Oxide Grinding Stones, Wrench and carrying Case.
Finish your holiday shopping early this year with help from Woodcraft.
Army Veteran Hank Robinson makes his mark in a most unusual way. Using a Dremel tool and his own imagination, he created a rolling tribute to honor those he served with, in the form of "Freedom Blues"—a 2016 Ford F150 Truck. | {
"redpajama_set_name": "RedPajamaC4"
} | 7,008 | [
128000,
791,
423,
1864,
301,
220,
3101,
15,
374,
279,
1121,
315,
47035,
832,
315,
423,
1864,
301,
596,
1455,
5526,
62917,
7526,
13,
578,
5507,
4519,
279,
64386,
74474,
16500,
19689,
2107,
449,
459,
18751,
60588,
430,
6276,
279,
19689,
2107,
311,
387,
1511,
439,
264,
60588,
311,
67845,
23090,
323,
60944,
279,
1205,
369,
264,
8821,
60588,
13,
13596,
1646,
14234,
374,
264,
810,
11297,
8571,
2955,
323,
3185,
81307,
430,
3493,
264,
36921,
4401,
5507,
11,
3339,
433,
10882,
369,
11838,
18852,
315,
1005,
13,
578,
220,
3101,
15,
1101,
4519,
264,
8045,
59402,
2955,
2737,
264,
92359,
35831,
19689,
2107,
311,
28696,
264,
47218,
2427,
4664,
5507,
3412,
13,
1472,
1101,
617,
279,
5845,
311,
1005,
682,
6484,
423,
1864,
301,
23090,
323,
1455
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
423,
1864,
301,
220,
3101,
15,
374,
279,
1121,
315,
47035,
832,
315,
423,
1864,
301,
596,
1455,
5526,
62917,
7526,
13,
578,
5507,
4519,
279,
64386,
74474,
16500,
19689,
2107,
449,
459,
18751,
60588,
430,
6276,
279,
19689,
2107,
311,
387,
1511,
439,
264,
60588,
311,
67845,
23090,
323,
60944,
279,
1205,
369,
264,
8821,
60588,
13,
13596,
1646,
14234,
374,
264,
810,
11297,
8571,
2955,
323,
3185,
81307,
430,
3493,
264,
36921,
4401,
5507,
11,
3339,
433,
10882,
369,
11838,
18852,
315,
1005,
13,
578,
220,
3101,
15,
1101,
4519,
264,
8045,
59402,
2955,
2737,
264,
92359,
35831,
19689,
2107,
311,
28696,
264,
47218,
2427,
4664,
5507,
3412,
13,
1472,
1101,
617,
279,
5845,
311,
1005,
682,
6484,
423,
1864,
301,
23090,
323,
1455,
-100
] |
This is the best time to see Western ghats and experience rain especially in the Malnad region of Tirthahalli in Karnataka. It is still unexplored and a place for someone who loves driving. Having been to Tirthahalli and surroundings many times, here is the recommended itinerary. Of course, this region can be visited throughout the year as well.
Make Tirthahalli as base – it is centrally located and has good stay options – and you can comfortably plan for four to five days of outing. It is also an area which receives heavy rain fall. Here is the recommended itenerary.
Day 1 – Leave Bangalore in the morning and reach Thirthahalli for Lunch. It is a comfortable six hours drive. Have breakfast enroute either at Tiptur (Kamat) or Arsikere (Raghavendra Lodge) or Kadur (Vinayaka Cafe) or Birur (Preethi Canteen). On the way visit Amritapura – five KMs from Tarikere for its famous Hoysala temple. In the evening go around town, visit Bheemanakatte for a quiet evening by Tunga river.
Experience the fury of rain and wind on Kundadari – you can drive up the hill and enjoy panoramic view, visit Agumbe Rain Forest research station for King Cobra etc, visit Jogi gundi and Koodlu Theerta water falls, walk on the streets where Swami and his friends walked in Malgudi Days, return back to Tirthahalli in evening. You may not be able to see beautiful sunset at Agumbe during monsoons.
After early breakfast drive to Kollur. Visit temple. On the way back visit Sigandur Chowdeshwari temple close to back waters. Go to ferry launch area. If ferries are plying hop on to experince the beauty of back waters.
Kavaledurga is a hillock fort close to Tirthahalli with amazing views of Mani reservoir and valleys. After break fast head towards Kavale durga. Trek the hill, enjoy the views. Drive to Mani dam and view beautiful surorundings. On the way back, visit Nagara Fort complex and return to Tirthahalli.
I am not sure of trekking of Kodachadri in Monsoons. If possible do it. Also visit beautiful Hittalamane falls at the fooot hills.
This can be done as a comfortable day trip. Need to check with forest dept whether the Sanctuary will be open during monsoons. The details are in the link below.
Visit famous temple at Ikkeri on the outskirts of Sagara. Drive to Jog falls. If time permits, come via Soraba and Gudavi to Tirthahalli after vsisting Gudavi bird sanctuary.
a) If one wants to visit Udupi, then they can deviate from Agumbe or Kollur.
b) If one wants to Murdeshwar and beyond te one can do so after Jog falls. Also there is a nice trek of Kanur fort from Jog falls for which one has to stay in Jog falls.
Accommodation in Thirthahalli: Travelers who love to experience the authentic and typical cuisines of malnad can book a Homestay in Thirthahalli for a rejuvenating experience. Added to homestays there are resorts in Thirthahalli located on River Tunga. | {
"redpajama_set_name": "RedPajamaC4"
} | 80 | [
128000,
2028,
374,
279,
1888,
892,
311,
1518,
11104,
37224,
1900,
323,
3217,
11422,
5423,
304,
279,
8560,
82044,
5654,
315,
350,
4914,
1494,
96893,
304,
79149,
13,
1102,
374,
2103,
653,
69331,
1171,
323,
264,
2035,
369,
4423,
889,
16180,
10043,
13,
20636,
1027,
311,
350,
4914,
1494,
96893,
323,
40190,
1690,
3115,
11,
1618,
374,
279,
11349,
74004,
13,
5046,
3388,
11,
420,
5654,
649,
387,
12263,
6957,
279,
1060,
439,
1664,
627,
8238,
350,
4914,
1494,
96893,
439,
2385,
1389,
433,
374,
85413,
7559,
323,
706,
1695,
4822,
2671,
1389,
323,
499,
649,
45769,
3197,
369,
3116,
311,
4330,
2919,
315,
65281,
13,
1102,
374,
1101,
459,
3158,
902,
21879,
8987,
11422,
4498,
13,
5810,
374,
279,
11349,
433,
804,
661,
627,
10369,
220,
16
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
2028,
374,
279,
1888,
892,
311,
1518,
11104,
37224,
1900,
323,
3217,
11422,
5423,
304,
279,
8560,
82044,
5654,
315,
350,
4914,
1494,
96893,
304,
79149,
13,
1102,
374,
2103,
653,
69331,
1171,
323,
264,
2035,
369,
4423,
889,
16180,
10043,
13,
20636,
1027,
311,
350,
4914,
1494,
96893,
323,
40190,
1690,
3115,
11,
1618,
374,
279,
11349,
74004,
13,
5046,
3388,
11,
420,
5654,
649,
387,
12263,
6957,
279,
1060,
439,
1664,
627,
8238,
350,
4914,
1494,
96893,
439,
2385,
1389,
433,
374,
85413,
7559,
323,
706,
1695,
4822,
2671,
1389,
323,
499,
649,
45769,
3197,
369,
3116,
311,
4330,
2919,
315,
65281,
13,
1102,
374,
1101,
459,
3158,
902,
21879,
8987,
11422,
4498,
13,
5810,
374,
279,
11349,
433,
804,
661,
627,
10369,
220,
16,
-100
] |
Kelsey Recht, CEO and Founder of VenueBook, had her "Ah Ha" moment when she was planning small fundraisers and alumni events as the "accidental planner". After struggling to find venues for those events, she took matters into her own hands. She left the world of finance for the start-up world to bring the concept she had in mind to life –VenueBook – a tool to take the pain out of the event planning process. Kelsey eats, breathes and lives events in NYC and can be found out almost any night of the week. Kelsey earned her MBA from The Kellogg School of Management and a BA from Williams College.
VenueBook is a complimentary, online event planning platform that matches event planners with New York City venues that meet their customized needs. VenueBook's new technology simplifies and streamlines the event booking process for both organizers and venues by allowing users to search venues based on specific criteria, and venues to list their space to vet new leads and manage all their events on VenueBook's cloud-based software program.
We are building the first end-to-end online platform for finding, booking and managing event spaces. Our analogy (because every start-up has one) is OpenTable for events.
Where did the idea for VenueBook come from?
A few years ago I was planning multiple events and had the "there must be better way to do this" moment. However, I didn't stop there. I knew I didn't have the tech or venue knowledge, so I went out and found it. Our CTO has planned multiple events and we designed our two-sided system with the help of an advisor that has run in-house events for NYC-based restaurants for years.
I am a big fan of the Four-Hour Work Week. I don't live it but what it teaches you is to compartmentalize your time. I spend the morning with our amazing team getting them up and running for the day. I then focus my afternoon on working with venues and corporate planners on training, sales, and marketing. Evenings are left for clearing out my inbox.
Iterate, iterate, iterate. Before we spend tech resources on a developing a system, we try to test it on a small basis first. Our team tries to test out hypotheses with "quick small fixes" before we make "large changes".
B2B2C and SKUization of services. Our system falls into both larger trends. Our platform is designed to help both corporations manage, track & streamline their events and venues run their event business. We also have average consumers that use our system too. I also am loving the ankle boots in the fashion magazines right now.
I worked at Baker's Square at the cash register one summer. It took me one day to master the cash register, so needless to say it was not an exciting summer. I did get to take home free pie often though. Yum!
Learn how to code in college or start a tech company with a developer already on board.
Speak to your customers on a regular basis but be mindful of the bigger picture. Customers might tell you they want to get around faster. However, they wouldn't have asked you for a car, they would have asked you for a faster horse.
I built a small prototype with an outsourced development team. It was horrible. However, I fixed that quickly when within three days I hired a CTO that I had only just met but knew was right, threw away my whole prototype and then never looked back. See above for what I would do over.
This one is really tough. I would eradicate hunger by pushing for self sufficiency through such organizations as The One Acre Fund. The One Acre Fund teaches farmers in Africa how to increase their yield from their crops.
My middle name is Carlyon. No that is not Carolyn. It is pronounced Car-Lion. I use to hate it, but now I embrace it. Roar.
Evernote – As a founder you multi-task a lot. Evernote helps keep me organized.
Silverlight – Silverlight records a video of your users and where they are clicking on your site. It is great to find choke points.
Dailypuppy.com – It's a throughput engine for your mini-breaks. Ok I lied. It is just pictures of cute puppies.
Getting Things Done aka GTD by David Allen. You always have too much to do at a start-up. Role up your sleeves, prioritize and GTD. Don't become paralyzed waiting for perfection.
Mark Suster for tech and VC related musings.
New York Nightlife for gossip on nightlife in NYC.
Wall Street Journal to ensure you read real news every day. There is more to life than tech and nightlife gossip.
I re-watched Gangnam Style the other day. It never gets old. As an event tech company – Rockin' Gangnam Style is a great addition to any event playlist.
My grandfather was an entrepreneur. You couldn't be around him without learning about the right way to treat people. Also, his former company is supplying all of the glass for the Freedom Tower. It reminds me that as an entrepreneur your legacy lives on.
"Don't tell me who caused the problem. Tell me how to fix it." Failure is natural in start-ups and I push our team to fail frequently. Fail quickly, accept it and then iterate. A wise mentor once told me 80% of what you are doing is likely wrong. Focus on what works and iterate rapidly.
See my third favorite tool online: DailyPuppy.com. If I didn't live in NYC, I would have a dog. A giant golden retriever. | {
"redpajama_set_name": "RedPajamaC4"
} | 3,455 | [
128000,
42,
93567,
1050,
14244,
11,
12432,
323,
55628,
315,
69460,
7280,
11,
1047,
1077,
330,
25797,
14433,
1,
4545,
994,
1364,
574,
9293,
2678,
27415,
62380,
323,
52121,
4455,
439,
279,
330,
4575,
62723,
50811,
3343,
4740,
20558,
311,
1505,
37278,
369,
1884,
4455,
11,
1364,
3952,
13146,
1139,
1077,
1866,
6206,
13,
3005,
2163,
279,
1917,
315,
17452,
369,
279,
1212,
5352,
1917,
311,
4546,
279,
7434,
1364,
1047,
304,
4059,
311,
2324,
1389,
91236,
7280,
1389,
264,
5507,
311,
1935,
279,
6784,
704,
315,
279,
1567,
9293,
1920,
13,
735,
93567,
50777,
11,
11745,
288,
323,
6439,
4455,
304,
34385,
323,
649,
387,
1766,
704,
4661,
904,
3814,
315,
279,
2046,
13,
735,
93567,
15662,
1077,
54554,
505,
578,
28263,
94469,
6150,
315,
9744,
323
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
42,
93567,
1050,
14244,
11,
12432,
323,
55628,
315,
69460,
7280,
11,
1047,
1077,
330,
25797,
14433,
1,
4545,
994,
1364,
574,
9293,
2678,
27415,
62380,
323,
52121,
4455,
439,
279,
330,
4575,
62723,
50811,
3343,
4740,
20558,
311,
1505,
37278,
369,
1884,
4455,
11,
1364,
3952,
13146,
1139,
1077,
1866,
6206,
13,
3005,
2163,
279,
1917,
315,
17452,
369,
279,
1212,
5352,
1917,
311,
4546,
279,
7434,
1364,
1047,
304,
4059,
311,
2324,
1389,
91236,
7280,
1389,
264,
5507,
311,
1935,
279,
6784,
704,
315,
279,
1567,
9293,
1920,
13,
735,
93567,
50777,
11,
11745,
288,
323,
6439,
4455,
304,
34385,
323,
649,
387,
1766,
704,
4661,
904,
3814,
315,
279,
2046,
13,
735,
93567,
15662,
1077,
54554,
505,
578,
28263,
94469,
6150,
315,
9744,
323,
-100
] |
The rise of the digital era has become fundamental in the travel and tourism industry. Digitalization is increasingly seen to empower travel consumers especially those seeking diversification and personalization for a remarkable experience. From the very initial stage of travel arrangements, the digital consumer seeks information key in deciding how, where, when to travel, what to expect and even more significantly, why to choose one destination, hotel, airline, or travel agency over another.
The latter is especially because price comparison as well as customer experience - often available via both offline and online customer reviews - are crucial in determining one's choice. Fascinatingly, the presence of Online Travel Agencies (OTAs) enables the provision of most of the looked-for information on one platform, which is easily accessed via smartphones. According to a Kenyan hospitality report by Jumia Travel, 71% of traffic to the online travel site is through mobile phones, while desktops and tablets are used by 26% and 3% of the visitors respectively.
According to eMarketer, a market research company, an increased appetite for leisure travel among the middle-class consumers will see digital travel expenditures top $817 billion globally by 2020. Combined with their quest for quality and flexible digital services, providers such as hotels, airlines and OTAs are deprived of options that aim for anything less than to meet their digital travel consumers at their points of need.
No longer is it enough for hoteliers to provide accommodation. They must now consider offering additional amenities most sought after by guests, such as Wi-Fi, a workout facility, swimming pool, a restaurant among others; depending on the target customer, either leisure or business. Getting around their destinations has also never been this convenient. With apps, online maps, translation, packing and even banking apps at the touch of a button, the surge of digital travelers can only be expected grow further as the year swiftly comes to an end.
To further benefit from the growing market, travel agents are also providing a multiplatform where travelers can receive more than one solution; such as hotels and flights options on one stop. Moreover, the novelty of digital payment solutions is further enticing more digital travelers, not only by simplifying their booking experience but also their payment options from their own comfort. | {
"redpajama_set_name": "RedPajamaC4"
} | 4,382 | [
128000,
791,
10205,
315,
279,
7528,
11639,
706,
3719,
16188,
304,
279,
5944,
323,
32083,
5064,
13,
14434,
2065,
374,
15098,
3970,
311,
26285,
5944,
13723,
5423,
1884,
11125,
21797,
2461,
323,
4443,
2065,
369,
264,
23649,
3217,
13,
5659,
279,
1633,
2926,
6566,
315,
5944,
28904,
11,
279,
7528,
11761,
26737,
2038,
1401,
304,
30230,
1268,
11,
1405,
11,
994,
311,
5944,
11,
1148,
311,
1755,
323,
1524,
810,
12207,
11,
3249,
311,
5268,
832,
9284,
11,
9689,
11,
33575,
11,
477,
5944,
9266,
927,
2500,
627,
791,
15629,
374,
5423,
1606,
3430,
12593,
439,
1664,
439,
6130,
3217,
482,
3629,
2561,
4669,
2225,
27258,
323,
2930,
6130,
8544,
482,
527,
16996,
304,
26679,
832,
596,
5873,
13,
70707,
16252,
398,
11,
279,
9546,
315,
8267,
18589
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
10205,
315,
279,
7528,
11639,
706,
3719,
16188,
304,
279,
5944,
323,
32083,
5064,
13,
14434,
2065,
374,
15098,
3970,
311,
26285,
5944,
13723,
5423,
1884,
11125,
21797,
2461,
323,
4443,
2065,
369,
264,
23649,
3217,
13,
5659,
279,
1633,
2926,
6566,
315,
5944,
28904,
11,
279,
7528,
11761,
26737,
2038,
1401,
304,
30230,
1268,
11,
1405,
11,
994,
311,
5944,
11,
1148,
311,
1755,
323,
1524,
810,
12207,
11,
3249,
311,
5268,
832,
9284,
11,
9689,
11,
33575,
11,
477,
5944,
9266,
927,
2500,
627,
791,
15629,
374,
5423,
1606,
3430,
12593,
439,
1664,
439,
6130,
3217,
482,
3629,
2561,
4669,
2225,
27258,
323,
2930,
6130,
8544,
482,
527,
16996,
304,
26679,
832,
596,
5873,
13,
70707,
16252,
398,
11,
279,
9546,
315,
8267,
18589,
-100
] |
Vidyanidhee Vanarase, (Prasad), completed his postgraduate program from the National School of Drama (NSD), New Delhi. He has designed and directed more than 50 plays in Marathi, Hindi, Konkani, Kannada, English and Gibberish. He has gained proficiency in Design and Direction, Administration and Management of Arts and Applied Arts. He is associated with theatre organizations of international repute for the last two decades including London International Festival of Theatre (2003-2008), Project Phakama, South Africa, UK and India (2002-till date), and Colombo International Theatre Festival (2012-till date) to name a few. He has been involved in theatre training for more than 25 years. He has contributed to several books including 'Yanni Ghadawala Sahasrak', an anthology on the millennium, 'Badal Sircar: Search for a Language of Theatre', a book edited by Prof Kirti Jain, 'Lamuna', Preface for the book, a compilation of short plays for Children and 'Project Phakama: Making Participatory Theatre', a book about Phakam Process edited by Prof Lucy Richardson. The book is published in February 2018 by Bloomsbury, UK. He is a Founder Director of International Association for Performing Arts and Research (IAPAR). IAPAR in the only Indian Member Institution of ITI/UNESCO-UNITWIN Network for Higher Education in Performing Arts. He is a Board Member of iSTAN, an international network for stage arts. He is a member of Executive Council of International Theatre Institute – UNESCO. He works as the Festival Director of the IAPAR International Theatre Festival, Pune, India. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,195 | [
128000,
53,
307,
8503,
307,
50153,
13000,
277,
521,
11,
320,
3617,
77711,
705,
8308,
813,
1772,
28770,
2068,
505,
279,
5165,
6150,
315,
47569,
320,
2507,
35,
705,
1561,
22767,
13,
1283,
706,
6319,
323,
15910,
810,
1109,
220,
1135,
11335,
304,
2947,
67631,
11,
45080,
11,
24277,
74,
5676,
11,
78311,
2649,
11,
6498,
323,
29479,
655,
819,
13,
1283,
706,
18661,
63239,
304,
7127,
323,
19438,
11,
17128,
323,
9744,
315,
17979,
323,
43608,
17979,
13,
1283,
374,
5938,
449,
34596,
11351,
315,
6625,
312,
8660,
369,
279,
1566,
1403,
11026,
2737,
7295,
7327,
17772,
315,
27315,
320,
1049,
18,
12,
1049,
23,
705,
5907,
2405,
587,
3105,
11,
4987,
10384,
11,
6560,
323,
6890,
320,
1049,
17,
2442,
484,
2457,
705,
323,
4349,
81487
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
53,
307,
8503,
307,
50153,
13000,
277,
521,
11,
320,
3617,
77711,
705,
8308,
813,
1772,
28770,
2068,
505,
279,
5165,
6150,
315,
47569,
320,
2507,
35,
705,
1561,
22767,
13,
1283,
706,
6319,
323,
15910,
810,
1109,
220,
1135,
11335,
304,
2947,
67631,
11,
45080,
11,
24277,
74,
5676,
11,
78311,
2649,
11,
6498,
323,
29479,
655,
819,
13,
1283,
706,
18661,
63239,
304,
7127,
323,
19438,
11,
17128,
323,
9744,
315,
17979,
323,
43608,
17979,
13,
1283,
374,
5938,
449,
34596,
11351,
315,
6625,
312,
8660,
369,
279,
1566,
1403,
11026,
2737,
7295,
7327,
17772,
315,
27315,
320,
1049,
18,
12,
1049,
23,
705,
5907,
2405,
587,
3105,
11,
4987,
10384,
11,
6560,
323,
6890,
320,
1049,
17,
2442,
484,
2457,
705,
323,
4349,
81487,
-100
] |
Usain Bolt Has Got Some Moves!
Who knew that one of the fastest people in the world had some pretty sweet dance moves? Jamaican sprinter Usain Bolt, widely known for his incredible speed, competed two days ago in the 4×100 meter relay at the Glasgow 2014 Commonwealth Games.
Before the race, Bolt decided to have a little fun with the crowd. He clapped and danced around to The Proclaimers' hit "I'm Gonna Be (500 Miles)," and an onlooker caught it all on film. Thank God for YouTube. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,990 | [
128000,
3642,
467,
47047,
11697,
25545,
4427,
57699,
4999,
15546,
7020,
430,
832,
315,
279,
26731,
1274,
304,
279,
1917,
1047,
1063,
5128,
10437,
15612,
11031,
30,
41259,
7210,
38949,
261,
4073,
467,
47047,
11,
13882,
3967,
369,
813,
15400,
4732,
11,
67235,
1403,
2919,
4227,
304,
279,
220,
19,
18028,
1041,
23819,
32951,
520,
279,
43997,
220,
679,
19,
38298,
11871,
627,
10438,
279,
7102,
11,
47047,
6773,
311,
617,
264,
2697,
2523,
449,
279,
13734,
13,
1283,
1206,
5795,
323,
84852,
2212,
311,
578,
1322,
8017,
388,
6,
4295,
330,
40,
2846,
480,
13767,
2893,
320,
2636,
36303,
36493,
323,
459,
389,
7349,
261,
10791,
433,
682,
389,
4632,
13,
9930,
4359,
369,
13674,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
3642,
467,
47047,
11697,
25545,
4427,
57699,
4999,
15546,
7020,
430,
832,
315,
279,
26731,
1274,
304,
279,
1917,
1047,
1063,
5128,
10437,
15612,
11031,
30,
41259,
7210,
38949,
261,
4073,
467,
47047,
11,
13882,
3967,
369,
813,
15400,
4732,
11,
67235,
1403,
2919,
4227,
304,
279,
220,
19,
18028,
1041,
23819,
32951,
520,
279,
43997,
220,
679,
19,
38298,
11871,
627,
10438,
279,
7102,
11,
47047,
6773,
311,
617,
264,
2697,
2523,
449,
279,
13734,
13,
1283,
1206,
5795,
323,
84852,
2212,
311,
578,
1322,
8017,
388,
6,
4295,
330,
40,
2846,
480,
13767,
2893,
320,
2636,
36303,
36493,
323,
459,
389,
7349,
261,
10791,
433,
682,
389,
4632,
13,
9930,
4359,
369,
13674,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Madi had a good start to her day. Daddy took her to Variety Village to do some work with Stephanie. The big focus was walking! She walked up a ramp, did some standing with ski boots & Gaitors and walking with her ski boots!
When Madi got home, Mommy set up her new Vibrafit vibration plate. It finally came (long story).
Many people with CP use vibration therapy to help improve things like circulation, bone density, muscle mass, balance and strength.
Mommy let Madi and Jack simply explore it today so Madi would be comfortable and then Madi will be doing different positional work on it like holding 4 point, high knees and standing on it.
Madison received priority mail today which she was excited to open. A beautiful letter was enclosed from Mario and the Romano family who supported Madison and many other families in Ontario who were in need of support for the same surgery Madison had. We are in the process of planning a dinner for all the families The Romano's supported so everyone can meet and give thanks. This is a very special letter that we will keep for Madison to have when she is older when she can truly appreciate the meaning of everything.
As the day went on, Madison quickly went down hill. She is under the weather and went to bed early. She will have a low key weekend to hopefully recover for Monday. | {
"redpajama_set_name": "RedPajamaC4"
} | 3,912 | [
128000,
44,
2836,
1047,
264,
1695,
1212,
311,
1077,
1938,
13,
54546,
3952,
1077,
311,
71832,
25036,
311,
656,
1063,
990,
449,
49243,
13,
578,
2466,
5357,
574,
11689,
0,
3005,
15203,
709,
264,
23091,
11,
1550,
1063,
11509,
449,
29779,
26302,
612,
480,
1339,
1105,
323,
11689,
449,
1077,
29779,
26302,
4999,
4599,
386,
2836,
2751,
2162,
11,
22969,
2465,
743,
709,
1077,
502,
97664,
969,
6410,
48913,
12235,
13,
1102,
5616,
3782,
320,
4930,
3446,
4390,
8607,
1274,
449,
15643,
1005,
48913,
15419,
311,
1520,
7417,
2574,
1093,
35855,
11,
17685,
17915,
11,
16124,
3148,
11,
8335,
323,
8333,
627,
59883,
2465,
1095,
386,
2836,
323,
7762,
5042,
13488,
433,
3432,
779,
386,
2836,
1053,
387,
10882,
323,
1243,
386,
2836,
690,
387,
3815,
2204,
68647
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
44,
2836,
1047,
264,
1695,
1212,
311,
1077,
1938,
13,
54546,
3952,
1077,
311,
71832,
25036,
311,
656,
1063,
990,
449,
49243,
13,
578,
2466,
5357,
574,
11689,
0,
3005,
15203,
709,
264,
23091,
11,
1550,
1063,
11509,
449,
29779,
26302,
612,
480,
1339,
1105,
323,
11689,
449,
1077,
29779,
26302,
4999,
4599,
386,
2836,
2751,
2162,
11,
22969,
2465,
743,
709,
1077,
502,
97664,
969,
6410,
48913,
12235,
13,
1102,
5616,
3782,
320,
4930,
3446,
4390,
8607,
1274,
449,
15643,
1005,
48913,
15419,
311,
1520,
7417,
2574,
1093,
35855,
11,
17685,
17915,
11,
16124,
3148,
11,
8335,
323,
8333,
627,
59883,
2465,
1095,
386,
2836,
323,
7762,
5042,
13488,
433,
3432,
779,
386,
2836,
1053,
387,
10882,
323,
1243,
386,
2836,
690,
387,
3815,
2204,
68647,
-100
] |
Командування доктрин та підготовки армії США, також TRADOC () створене у 1973 р. і є одним із командувань СВ США нарівні з Forces Command (FORSCOM), Army Materiel Command (AMC) та Army Futures Command (AFC). Одним із завдань TRADOC є організація розробки концепцїй застосування (operating concept) і подальше удосконалення доктрин СВ США.
TRADOC підпорядковані 37 шкіл і центрів.
Див. також
Army Futures Command
RDECOM
Форт Лівенворт
Армія США
Примітки
Посилання
Офіційний сайт TRADOC
Військові акроніми
Засновані у США 1973
Командування Збройних сил США | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 621 | [
128000,
120783,
76559,
101104,
102255,
101231,
19479,
100344,
116315,
17165,
102462,
100691,
100268,
107003,
11,
103025,
5091,
1846,
7767,
1754,
105740,
110416,
14257,
220,
4468,
18,
18600,
13,
84954,
101249,
111657,
102112,
112860,
100396,
102515,
28599,
16604,
107003,
13373,
104288,
100279,
11122,
30500,
7498,
320,
32002,
3624,
1937,
705,
13309,
99408,
13327,
7498,
320,
1428,
34,
8,
100344,
13309,
77367,
7498,
320,
32,
6897,
570,
220,
103992,
100698,
102112,
113518,
102515,
5091,
1846,
7767,
101249,
107056,
112347,
113881,
17165,
220,
127537,
10589,
100268,
12415,
114889,
320,
3376,
1113,
7434,
8,
84954,
125094,
60009,
102796,
23630,
48199,
14525,
102728,
102255,
101231,
19479,
28599,
16604,
107003,
382,
2434,
1846,
7767,
100621,
8164,
108594,
90877,
101262,
220,
1806,
103020,
101425,
84954,
103806,
104288,
382,
25079,
28089,
13,
103025,
720,
13309,
77367
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
120783,
76559,
101104,
102255,
101231,
19479,
100344,
116315,
17165,
102462,
100691,
100268,
107003,
11,
103025,
5091,
1846,
7767,
1754,
105740,
110416,
14257,
220,
4468,
18,
18600,
13,
84954,
101249,
111657,
102112,
112860,
100396,
102515,
28599,
16604,
107003,
13373,
104288,
100279,
11122,
30500,
7498,
320,
32002,
3624,
1937,
705,
13309,
99408,
13327,
7498,
320,
1428,
34,
8,
100344,
13309,
77367,
7498,
320,
32,
6897,
570,
220,
103992,
100698,
102112,
113518,
102515,
5091,
1846,
7767,
101249,
107056,
112347,
113881,
17165,
220,
127537,
10589,
100268,
12415,
114889,
320,
3376,
1113,
7434,
8,
84954,
125094,
60009,
102796,
23630,
48199,
14525,
102728,
102255,
101231,
19479,
28599,
16604,
107003,
382,
2434,
1846,
7767,
100621,
8164,
108594,
90877,
101262,
220,
1806,
103020,
101425,
84954,
103806,
104288,
382,
25079,
28089,
13,
103025,
720,
13309,
77367,
-100
] |
Bryce Gilmore moved his beloved nose-to-tail restaurant to a bigger, better spot uptown. His tasting menu is still there, but with new a la carte additions like crab tamales and pig skin noodles. No time to leave downtown? Drop by his other South Lamar spot, Odd Duck, for equally outstanding small plates (think mustard seed tater tots, shitake doughnuts, and croissants with runny egg yolk). | {
"redpajama_set_name": "RedPajamaC4"
} | 92 | [
128000,
33,
894,
346,
21456,
6518,
7882,
813,
28530,
19689,
4791,
2442,
607,
10960,
311,
264,
11493,
11,
2731,
7858,
35435,
785,
13,
5414,
47500,
5130,
374,
2103,
1070,
11,
719,
449,
502,
264,
1208,
48454,
38314,
1093,
60512,
259,
3105,
645,
323,
24623,
6930,
61260,
13,
2360,
892,
311,
5387,
19441,
30,
16110,
555,
813,
1023,
4987,
62284,
7858,
11,
56136,
46870,
11,
369,
18813,
19310,
2678,
25485,
320,
27963,
65407,
10533,
259,
977,
2458,
82,
11,
17619,
731,
31452,
64866,
11,
323,
14425,
1056,
1821,
449,
1629,
3919,
19151,
379,
23427,
570,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
33,
894,
346,
21456,
6518,
7882,
813,
28530,
19689,
4791,
2442,
607,
10960,
311,
264,
11493,
11,
2731,
7858,
35435,
785,
13,
5414,
47500,
5130,
374,
2103,
1070,
11,
719,
449,
502,
264,
1208,
48454,
38314,
1093,
60512,
259,
3105,
645,
323,
24623,
6930,
61260,
13,
2360,
892,
311,
5387,
19441,
30,
16110,
555,
813,
1023,
4987,
62284,
7858,
11,
56136,
46870,
11,
369,
18813,
19310,
2678,
25485,
320,
27963,
65407,
10533,
259,
977,
2458,
82,
11,
17619,
731,
31452,
64866,
11,
323,
14425,
1056,
1821,
449,
1629,
3919,
19151,
379,
23427,
570,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Do you need a way to increase student achievement, enhance staff productivity, enable parental involvement, and build effective learning communities?
Contemporary learning is an ever-changing and complex task. Not only does it require physical infrastructure, such as a school building, it also requires a complex, costly, and reliable digital infrastructure that students need to learn and educators need to teach.
This is more than simply plugging in a computer and loading software.
For technology to be truly effective in today's education system, it needs to be integrated into a rich, learner-centered environment. But how does education technology improve student learning? What evidence can we gather to determine if it is? How can data be communicated effectively to teachers, parents, and community members?
A comprehensive IT Blueprint will accommodate 21st century learning, improve student achievement, enhance staff productivity, and save three to four times more than the plan costs.
There are hundreds of research-based, classroom applications of technology that can make a real difference for your students. How do teachers connect these powerful solutions to student achievement and what are the skill sets necessary for their use? CELT is your partner in developing, implementing, or assessing a comprehensive technology blueprint to meet the needs of your school district or educational organization now and in the future. Even if you already have an information technology blueprint or plan, CELT can help you maximize its effectiveness throughout your organization. Our job is to help keep the school-home-community connection alive and well. | {
"redpajama_set_name": "RedPajamaC4"
} | 7,173 | [
128000,
5519,
499,
1205,
264,
1648,
311,
5376,
5575,
26501,
11,
18885,
5687,
26206,
11,
7431,
46679,
22315,
11,
323,
1977,
7524,
6975,
10977,
5380,
825,
14084,
6975,
374,
459,
3596,
49961,
323,
6485,
3465,
13,
2876,
1193,
1587,
433,
1397,
7106,
14054,
11,
1778,
439,
264,
2978,
4857,
11,
433,
1101,
7612,
264,
6485,
11,
34348,
11,
323,
15062,
7528,
14054,
430,
4236,
1205,
311,
4048,
323,
50794,
1205,
311,
4639,
627,
2028,
374,
810,
1109,
5042,
628,
36368,
304,
264,
6500,
323,
8441,
3241,
627,
2520,
5557,
311,
387,
9615,
7524,
304,
3432,
596,
6873,
1887,
11,
433,
3966,
311,
387,
18751,
1139,
264,
9257,
11,
64060,
50482,
4676,
13,
2030,
1268,
1587,
6873,
5557,
7417,
5575,
6975,
30,
3639,
6029,
649,
584,
9762,
311,
8417
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
5519,
499,
1205,
264,
1648,
311,
5376,
5575,
26501,
11,
18885,
5687,
26206,
11,
7431,
46679,
22315,
11,
323,
1977,
7524,
6975,
10977,
5380,
825,
14084,
6975,
374,
459,
3596,
49961,
323,
6485,
3465,
13,
2876,
1193,
1587,
433,
1397,
7106,
14054,
11,
1778,
439,
264,
2978,
4857,
11,
433,
1101,
7612,
264,
6485,
11,
34348,
11,
323,
15062,
7528,
14054,
430,
4236,
1205,
311,
4048,
323,
50794,
1205,
311,
4639,
627,
2028,
374,
810,
1109,
5042,
628,
36368,
304,
264,
6500,
323,
8441,
3241,
627,
2520,
5557,
311,
387,
9615,
7524,
304,
3432,
596,
6873,
1887,
11,
433,
3966,
311,
387,
18751,
1139,
264,
9257,
11,
64060,
50482,
4676,
13,
2030,
1268,
1587,
6873,
5557,
7417,
5575,
6975,
30,
3639,
6029,
649,
584,
9762,
311,
8417,
-100
] |
Peach, often reffered to as the fruit of calmness, it is a stress reliever that helps reduce anxiety. It is also used as a kidney cleanser.
One of our favorites teas, enjoy the natural peach flavor in Pure Ceylon, Garden Fresh, Premium AZ Black Tea, packed within days of manufacture. Available loose and in silken pyramid tea.
Pure Ceylon Black Tea, Peach Flavoring, Dried Peach Pieces. | {
"redpajama_set_name": "RedPajamaC4"
} | 3,011 | [
128000,
47,
9739,
11,
3629,
312,
3018,
291,
311,
439,
279,
14098,
315,
19858,
2136,
11,
433,
374,
264,
8631,
59644,
424,
430,
8779,
8108,
18547,
13,
1102,
374,
1101,
1511,
439,
264,
39042,
35294,
261,
627,
4054,
315,
1057,
27672,
30668,
11,
4774,
279,
5933,
73188,
17615,
304,
30688,
356,
1216,
12490,
11,
19558,
30260,
11,
26745,
31976,
5348,
31125,
11,
19937,
2949,
2919,
315,
30847,
13,
16528,
20784,
323,
304,
5554,
2779,
47897,
15600,
627,
58713,
356,
1216,
12490,
5348,
31125,
11,
64695,
66099,
287,
11,
423,
4588,
64695,
68640,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
47,
9739,
11,
3629,
312,
3018,
291,
311,
439,
279,
14098,
315,
19858,
2136,
11,
433,
374,
264,
8631,
59644,
424,
430,
8779,
8108,
18547,
13,
1102,
374,
1101,
1511,
439,
264,
39042,
35294,
261,
627,
4054,
315,
1057,
27672,
30668,
11,
4774,
279,
5933,
73188,
17615,
304,
30688,
356,
1216,
12490,
11,
19558,
30260,
11,
26745,
31976,
5348,
31125,
11,
19937,
2949,
2919,
315,
30847,
13,
16528,
20784,
323,
304,
5554,
2779,
47897,
15600,
627,
58713,
356,
1216,
12490,
5348,
31125,
11,
64695,
66099,
287,
11,
423,
4588,
64695,
68640,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Xml.XPath;
namespace WATF.Compiler.Executive.Test
{
public class Test : WATF.Compiler.Interface.WATFPathNavigator
{
Interface.WATFDictionary<String, Interface.WATFPathNavigator> m_TestChilds = null;
public Test(XPathNavigator xPathNavigator)
: base(xPathNavigator)
{
m_TestChilds = new Interface.WATFDictionary<string, Interface.WATFPathNavigator>();
XPathNodeIterator xPathNodeIterator = xPathNavigator.CreateNavigator().SelectChildren(XPathNodeType.Element);
while (xPathNodeIterator.MoveNext())
{
if (xPathNodeIterator.Current.LocalName.Equals(GlobalDefine.Keyword.Executive.Step))
{
m_TestChilds.Add(GlobalDefine.Keyword.Executive.Step, new Step.Step(xPathNodeIterator.Current));
}
}
}
public override int Init(string value = "")
{
throw new NotImplementedException();
}
public override object Run(object value = null)
{
//throw new NotImplementedException();
foreach (KeyValuePair<String, Interface.WATFPathNavigator> TestChild in this.m_TestChilds)
{
if (TestChild.Key.Equals(GlobalDefine.Keyword.Executive.Step))
{
TestChild.Value.Run(value);
}
}
return default(object);
}
public override void UnInit(string value = "")
{
throw new NotImplementedException();
}
}
}
| {
"redpajama_set_name": "RedPajamaGithub"
} | 4,656 | [
128000,
985,
744,
280,
985,
744,
3656,
4439,
280,
985,
744,
6162,
280,
985,
744,
2021,
280,
985,
744,
18032,
76975,
401,
2280,
468,
835,
37,
37052,
31898,
6844,
8963,
198,
517,
262,
586,
538,
3475,
551,
468,
835,
37,
37052,
42165,
1196,
835,
37,
1858,
20591,
198,
262,
341,
286,
20620,
1196,
835,
37,
8685,
3548,
11,
20620,
1196,
835,
37,
1858,
20591,
29,
296,
33641,
3736,
82,
284,
854,
280,
286,
586,
3475,
7799,
1858,
20591,
865,
1858,
20591,
340,
310,
551,
2385,
2120,
1858,
20591,
340,
286,
341,
310,
296,
33641,
3736,
82,
284,
502,
20620,
1196,
835,
37,
8685,
5053,
11,
20620,
1196,
835,
37,
1858,
20591,
4000,
310,
66242,
1997,
12217,
865,
1858,
1997,
12217,
284,
865,
1858,
20591,
7399,
20591,
1020,
3461
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
985,
744,
280,
985,
744,
3656,
4439,
280,
985,
744,
6162,
280,
985,
744,
2021,
280,
985,
744,
18032,
76975,
401,
2280,
468,
835,
37,
37052,
31898,
6844,
8963,
198,
517,
262,
586,
538,
3475,
551,
468,
835,
37,
37052,
42165,
1196,
835,
37,
1858,
20591,
198,
262,
341,
286,
20620,
1196,
835,
37,
8685,
3548,
11,
20620,
1196,
835,
37,
1858,
20591,
29,
296,
33641,
3736,
82,
284,
854,
280,
286,
586,
3475,
7799,
1858,
20591,
865,
1858,
20591,
340,
310,
551,
2385,
2120,
1858,
20591,
340,
286,
341,
310,
296,
33641,
3736,
82,
284,
502,
20620,
1196,
835,
37,
8685,
5053,
11,
20620,
1196,
835,
37,
1858,
20591,
4000,
310,
66242,
1997,
12217,
865,
1858,
1997,
12217,
284,
865,
1858,
20591,
7399,
20591,
1020,
3461,
-100
] |
The story of Sporting Limburg, the Dutch power that never was
26/02/2018 by Indro Pajaro
At the turn of the Millenium, football was suffering a decline in the southern Dutch region of Limburg. All the main local clubs found themselves in dire financial straits, yo-yoing between the first and second tiers.
Fortuna Sittard's last appearance in the Eredivisie was in 2002, and the club was saddled with €5m worth of debt. Roda JC had sunk into a cycle of negative results and were in acute danger of relegation, while second-tier VVV Venlo had never threatened the big guns, despite the arrival of a new and ambitious owner. Last, and quite possibly least, MVV Maastricht had been missing from the top flight since 2000. The province of Limburg and the KNVB were facing one of their most critical football-related dilemmas in recent history. Something had to be done.
In January 2008, the Governor of Limburg, Léon Frissen, floated an unlikely solution to resolve the issue: the potential merger of three of the region's clubs. Under Frissen's initiative, Fortuna, MVV and Roda would become one single entity that would be called Sporting Limburg. Limburg would enter 2009/10 Eredivisie with the goal of staying up.
Local businesses supported the merger, but nobody dealt with the one great brooding elephant in the room: all the teams involved were bitter rivals. Their fans hated one another and resented and resisted this madcap notion of banding together. In particular, Fortuna fans feared their club would simply be absorbed by the bigger Roda, while the Roda fans dreaded the dilution of everything they loved about their team.
On top of that, both rejected any notion of teaming up with their arrogant neighbours – a feeling that was entirely mutual in Maastricht. It was believed that the overwhelming majority would not attend Limburg's games or renew season tickets at their existing clubs for as long as this folly persisted.
It was the beginning of a prolonged affair that would fill the front pages of all the major Dutch sports papers. Initially, not even the boards of the three clubs were excited about the idea and for a while, the scheme appeared to be dead and buried. Eight months later, however, Fortuna's financial situation hit rock bottom and Frissen's initial pipe-dream became an actual, tangible proposition.
Read | How Amsterdam changed the world of football forever
In October, the KNVB met with Fortuna's executives to announce its intention of revoking the club's professional license due to its debts. The KNVB had the right intentions – it was sure that the only safe way to ensure Fortuna's future was through this merger with the other, healthier sides. MVV Maastricht's board of directors insisted they were against any merger of any sort. So, since VVV had never really been in the picture, the issue now concerned just Fortuna and Roda.
In short, politics wanted the merger; the fans did not. They set about an orchestrated campaign of militant resistance. Board members' cars and houses were vandalized, with several needing police protection due to death threats. But, in November 2008, the boards of Roda and Fortuna agreed to an official start of merger negotiations. Unsurprisingly, both sides' next games were marked by full-scale riots, at home and away.
By the middle of the month, the License Commission – the KNVB management team responsible for overseeing all Dutch clubs' financial health – decided to proceed with the cancellation of Fortuna Sittard's professional license. The club was told that their only chance of continuing was to agree to merge with Roda in time for the new season.
In February 2009, the Major Football Management Group in Limburg – a committee established to investigate the future of football in the province – ratified the merger between Roda and Fortuna. Everything seemed to be set – until the municipal government of Sittard-Geleen declared that it would not annul any of Fortuna's existing debts. Indeed, one of the strict conditions of the agreement was that both clubs had to completely pay off their debts.
While the government of Kerkrade was willing to help Roda, as they had an ongoing financial interest in the stadium, their equivalent in Sittard-Geleen was unwilling to do the same for Fortuna. As a result, club's license was officially revoked, meaning that Fortuna Sittard was going to withdraw from professional football by 30 June 2009.
Read | How a self-imposed stereotype and the Bosman ruling caused the demise of Dutch football
However, with the negotiations at such an advanced stage, this turned out to be a temporary setback. The osmosis of the new club gathered pace; it would take the name Sporting Limburg – found to be the least-disliked name among the various and far-fetched proposals – and it was decreed the team would wear an entirely yellow kit for its home games and a blue kit for away matches.
The short-lived story of Sporting Limburg officially started on 2 April, when the boards of Fortuna and Roda finally worked out an agreement. The new club would embark upon the Eredivisie 2009/10 campaign and would use Roda's stadium in Kerkrade for its home games. The very next day, the province announced that Sporting Limburg would start with an annual budget of €14 million, including a €3 million subsidy from public funds. The overall plan was to subsidise Sporting to the tune of €6.5 million over the next four years, a prospect that didn't go down well with the left-out sides, unhappy that public money was to be allocated to rival teams. This growing sense of injustice led MVV and VVV to lodge a complaint to the province.
The entire Sporting Limburg drama lasted less than a week. By 7 April, the province voted against financing the new team as Fortuna had failed to comply with the conditions of their debt cancellation. Thus came the demise of a club that never actually existed – except on paper. Two days later, the merger was officially called off by the Parliament of Limburg. Without the province's support and with Roda unable to cover Fortuna's debts, there was no further reason to keep going with this almighty white elephant, and both clubs quietly chose to pull the plug.
But if the saga was over for Roda, the same could not be said for Fortuna. With the KNVB having publicly threatened their club with closure, Fortuna fans clubbed together to raise the money needed to ward off a winding-up order. They had to come up with €5 million before the start of the next season, and they very nearly succeeded. After the fundraising effort, a debt of only €600,000 remained. A testimonial match against Bayern Munich took care of that shortfall – Fortuna Sittard was saved. Except it wasn't. The License Commission stood firm: Fortuna's license had to be revoked.
The matter made its inevitable way court, but the club that showed up was not the same that had begun this bizarre saga. Almost all of Fortuna's professional playing staff had left, with only those on amateur or youth contracts remaining. Yet somehow, finally, Fortuna won. After the intervention of the KVVB, which in itself was censured by the law court for self-interest and interference, Fortuna received its new license.
This unfortunate series of events was not the only attempt at a merger in the history of Dutch football – and it likely won't be the last, either. But an affair as protracted and barely-believable as that of Sporting Limburg, in which cash was both the alpha and the omega, will almost certainly never happen again.
By Indro Pajaro @IndroPajaro
Tags: eredivisie, fortuna, holland, limburg, mvv, roda
Indro Pajaro 26/02/2018 | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 416 | [
128000,
791,
3446,
315,
65403,
13903,
10481,
11,
279,
24113,
2410,
430,
2646,
574,
198,
1627,
14,
2437,
14,
679,
23,
555,
2314,
299,
393,
1662,
17606,
198,
1688,
279,
2543,
315,
279,
8384,
268,
2411,
11,
9141,
574,
16066,
264,
18174,
304,
279,
18561,
24113,
5654,
315,
13903,
10481,
13,
2052,
279,
1925,
2254,
19424,
1766,
5694,
304,
13510,
6020,
610,
57579,
11,
30596,
12303,
78,
287,
1990,
279,
1176,
323,
2132,
64271,
627,
34380,
8733,
328,
1468,
569,
596,
1566,
11341,
304,
279,
96113,
614,
285,
648,
574,
304,
220,
1049,
17,
11,
323,
279,
6469,
574,
58272,
839,
449,
13281,
20,
76,
5922,
315,
11897,
13,
13611,
64,
61683,
1047,
68265,
1139,
264,
11008,
315,
8389,
3135,
323,
1051,
304,
30883,
8137,
315,
59782,
367
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
3446,
315,
65403,
13903,
10481,
11,
279,
24113,
2410,
430,
2646,
574,
198,
1627,
14,
2437,
14,
679,
23,
555,
2314,
299,
393,
1662,
17606,
198,
1688,
279,
2543,
315,
279,
8384,
268,
2411,
11,
9141,
574,
16066,
264,
18174,
304,
279,
18561,
24113,
5654,
315,
13903,
10481,
13,
2052,
279,
1925,
2254,
19424,
1766,
5694,
304,
13510,
6020,
610,
57579,
11,
30596,
12303,
78,
287,
1990,
279,
1176,
323,
2132,
64271,
627,
34380,
8733,
328,
1468,
569,
596,
1566,
11341,
304,
279,
96113,
614,
285,
648,
574,
304,
220,
1049,
17,
11,
323,
279,
6469,
574,
58272,
839,
449,
13281,
20,
76,
5922,
315,
11897,
13,
13611,
64,
61683,
1047,
68265,
1139,
264,
11008,
315,
8389,
3135,
323,
1051,
304,
30883,
8137,
315,
59782,
367,
-100
] |
Home Get inspired! Deventer Library
Deventer Library
BiermanHenket Architecten
Subscribe to our newsletter and we keep you informed about the latest updates
Yes, keep me informed
We call you backSend us an email
The new public library in Stromarkt, Deventer is contemporary in design and use of materials, while blending in beautifully with its historical context. An impressive feature of this design by BiermanHenket architects for a building of this size. With its large glass windows, the new library building extends a welcoming invitation to the city.
Since its opening in 2018, the new library in Stromarkt has been popular with Deventer residents of all ages. All of the 500 seats are occupied on an almost daily basis. And that was exactly the intention. Janneke Bierman of BiermanHenket architects: 'This building has to appeal to young and old; it has to be an accessible place for people to meet, study and engage in literary activities. That's why we designed an open-plan building, in every direction, with a cosy café-restaurant on the ground floor. We deliberately didn't put the staircase right behind the entrance, so that people would spend a bit more time on the ground floor. Along the façade, there is an inviting wide oak staircase leading to two further library floors.'
"This building has to appeal to young and old; it has to be an accessible place for people to meet, study and engage in literary activities."Janneke Bierman - BiermanHenket architects
Fits in the historical context
With the height, articulation and choice of materials, the architect has managed to create a building that fits in well in the historical city centre. 'It replaces a bank from the 1960s. But the bank's fine grid of concrete columns meant that it couldn't be repurposed as the new library because this had to have an open-plan design. The basements were retained, though, and the columns of the new building have been placed partly on the existing basement columns and partly on new screw piles. The new volume is 15.5 metres high and more or less follows the contours of the old bank, except on the east side, where the building extends a bit further than its predecessor. The result is that the L-shape Stromarkt now comprises two clear, urban spaces. Fortunately, the tall plane trees in Stromarkt could be kept.'
The famous 12th century neighbouring building, the oldest surviving stone house in the Netherlands, has been partly incorporated into the library. This monument now houses a quiet area, an exhibition space and an office space.
Glass and ceramic
The side walls consist largely of steel curtain walls. The glass is set in slim aluminium profiles by Reynaers Aluminium, fitted on the steel construction directly behind the wall. Other parts of the façade have been clad with ceramic panels. 'We designed these panels specifically for this building in six versions. We chose the colour ochre because it's so common in the buildings of Deventer. The elements have vertical lines, with smooth ridges and grooves alternating each other with two different comb structures.'
Set in the wall surfaces with ceramic panels are windows in clean-lined aluminium frames in a variety of sizes. Particularly eye-catching are the large diagonal windows on two corners of the building. In the entrance wall, narrow wall openings have been created across two floors. Floor-high steel frames made the large glass section above the entrance possible.
Spacious and bright
The ground floor is open plan, which allows for a flexible layout. It is a continuous meeting space, which is also used for workshops, debates and lectures. Next to the entrance, there is a café-restaurant. The south wall by the garden is largely made of glass. Along this wall, there is a vide (an open space) leading to a glass connection, which creates a visual separation between the now-connected new and historical building.
The wide staircase and open space on the north side provide a sight line all the way up to the second floor. Here, too, there are vides and skylights flood the space with natural light.
Open spaces, stairs and windows create connecting views through the library and to the outside. On the second floor, glass windows and a large corner window offer wide panoramic views of the old city centre.
From auditorium to smart lab
Apart from the usual library functions (being a facility where visitors can research, borrow books and read), the new building is equipped for a whole host of extra activities. For instance, in the basement, there is a small cinema and auditorium with 80 seats, among other things. In addition, there are book archives and a bike shelter for staff. 'To create a pleasant height in the basement auditorium, the floor was raised by 1 metre. We were already dealing with differences in height in this space anyway: from the entrance, the floor level rises gradually towards the historical building by 1 metre,' Bierman explains.
On the ground floor and on the first and second floor, there are a wide variety of consultation, chill-out and study areas, namely the quiet area in the historical part of the building, dining tables, armchairs, high and low tables, alcoves for sitting and lying down, stools, bleacher stairs, windowsills, long tables in the open spaces, benches and play tables, the garden and roof terrace.
And, of course, there are bookcases with books, films and music. These modern bookcases are transparent frameworks, sometimes filled but they often also provide views.
The office spaces are concentrated in the southwest part of the first floor of the new building and on the first and second floors of the old building.
On the top floor, a smart lab was created with a focus on making things, complete with 3D printers and benches. Adjoining the lab, the roof terrace offers spectacular views of the old city centre.
Fabricator:
Alkondor Hengelo
Deventer, the Netherlands
Jan Willem Schouten
Other partners:
PHB Deventer (General contractors)
Used systems:
CW 50
Want to add something to this project?
BMW Artville
BMW Artville was a temporary art experience on the beach of Knokke-Heist, Belgium. This wood and glass construction constisted out of 2 pavilions and a beach terrace....
LA MÉCA
MÉCA's asymmetrical arch – 37 m high by 120 m wide – distorts perspectives and vanishing points....
Quion Rock Wine Estate
Bringing the spectacular exterior landscape into the wine estate's interior spaces.
Sherwood Court
Sherwood Court offers bespoke boutique concept living for London students with Reynaers
Groene Toren Eindhoven
The former office building de Groene Toren, built in 1974 after a design by architect Dick van Mourik, has been converted into homes and a hotel....
Torre Albia
Renovation of an office building in Bilbao. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 2,310 | [
128000,
7778,
2175,
14948,
0,
1611,
688,
261,
11896,
198,
1951,
688,
261,
11896,
198,
33,
1291,
1543,
50461,
26554,
24979,
268,
198,
29673,
311,
1057,
20846,
323,
584,
2567,
499,
16369,
922,
279,
5652,
9013,
198,
9642,
11,
2567,
757,
16369,
198,
1687,
1650,
499,
1203,
11764,
603,
459,
2613,
198,
791,
502,
586,
6875,
304,
93703,
847,
83,
11,
1611,
688,
261,
374,
19225,
304,
2955,
323,
1005,
315,
7384,
11,
1418,
56941,
304,
32719,
449,
1202,
13970,
2317,
13,
1556,
16358,
4668,
315,
420,
2955,
555,
426,
1291,
1543,
50461,
26554,
56035,
369,
264,
4857,
315,
420,
1404,
13,
3161,
1202,
3544,
9168,
11276,
11,
279,
502,
6875,
4857,
2289,
264,
36387,
29788,
311,
279,
3363,
627,
12834,
1202,
8736,
304,
220,
679,
23,
11
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
7778,
2175,
14948,
0,
1611,
688,
261,
11896,
198,
1951,
688,
261,
11896,
198,
33,
1291,
1543,
50461,
26554,
24979,
268,
198,
29673,
311,
1057,
20846,
323,
584,
2567,
499,
16369,
922,
279,
5652,
9013,
198,
9642,
11,
2567,
757,
16369,
198,
1687,
1650,
499,
1203,
11764,
603,
459,
2613,
198,
791,
502,
586,
6875,
304,
93703,
847,
83,
11,
1611,
688,
261,
374,
19225,
304,
2955,
323,
1005,
315,
7384,
11,
1418,
56941,
304,
32719,
449,
1202,
13970,
2317,
13,
1556,
16358,
4668,
315,
420,
2955,
555,
426,
1291,
1543,
50461,
26554,
56035,
369,
264,
4857,
315,
420,
1404,
13,
3161,
1202,
3544,
9168,
11276,
11,
279,
502,
6875,
4857,
2289,
264,
36387,
29788,
311,
279,
3363,
627,
12834,
1202,
8736,
304,
220,
679,
23,
11,
-100
] |
Regulatory references: making informed decisions on recruitment
In September 2016 the PRA and FCA published a final set of rules on regulatory references, following a consultation launched in October 2015. The new rules come into force on 7 March 2017.
Regulatory references have been introduced to help prevent the much-criticised "recycling" of employees with poor conduct records between regulated firms. It is intended that these references will enable employers to make more informed and accurate recruitment decisions on the fitness and propriety of candidates for senior roles and other key functions.
Which firms are affected by the new rules?
From March 2017 the new rules will apply directly to the following (collectively referred to in this briefing as "banks"):
Banks.
Building societies.
Credit unions.
PRA-designated investment firms.
They will also apply to the following (collectively referred to as "insurers"):
Insurance and re-insurance firms within the scope of Solvency II.
Other large non-Directive firms.
However, the new regime will be relevant to all firms across the financial services sector as regulated firms will have to be ready to comply with the requirement to provide an enhanced level of information about former employees if receiving a request for a regulatory reference.
Who needs a regulatory reference?
Candidates applying for any of following functions may require a regulatory reference:
Senior Management Functions.
Significant Harm Functions under the Certification Regime.
Senior Insurance Management Functions.
FCA-approved Significant Influence Functions within insurers.
Key Function Holders within insurers.
Certain non-executive director roles.
Financial services firms currently outside the full scope of the regime will also watch developments with interest as the FCA has made clear its intention to extend this regime to other firms in the sector in 2018.
What do banks and insurers need to do?
Banks and insurers will be subject to four key obligations:
1. Take reasonable steps to obtain references
Banks and insurers must take reasonable steps to obtain references from all previous employers in the last 6 years. The regulators have not defined "reasonable steps", but regulator guidance sets out that regulated firms required to provide a reference are expected to be able to do so within 6 weeks of receipt of a request.
References should be obtained before an application for approval is submitted. If this is not possible, references must be obtained no later than one month before the end of the application process.
Firms within a group do not need to request a reference from each other where the group has centralised records or alternative means of sharing relevant information as part of the assessment of candidates' fitness and propriety.
2. Provide references and disclose mandatory information
The regulators have provided a standard template for the reference with the aim of ensuring a consistent approach. Firms are also required to disclose the following mandatory information:
Details of all roles held, including a summary of responsibilities.
Breaches of an individual conduct requirement in the past six years.
Any findings that the individual was not fit and proper in the six years prior to the request for a regulatory reference.
Any disciplinary action associated with conduct or fitness and propriety taken in the six years preceding the request for a regulatory reference or between the date of the request for a regulatory reference and the date the reference is given. Disciplinary action includes issuing a formal written warning or dismissal of a person or reduction or recovery of any of the person's remuneration if imposed due to a breach of an individual conduct requirement. Suspensions imposed pending an internal investigation do not constitute disciplinary action.
Where a firm has no breaches or findings to report, this must be expressly stated in the reference.
Firms are free to make changes to the format of the standard template where necessary, so long as it does not affect what has to be disclosed under the rules.
Firms must not enter into any arrangements or agreements that limit their ability to disclose the above information. This may represent a change in approach for some firms who might previously have agreed a neutral short-form reference as part of a settlement agreement.
3. Update references when new information comes to light
Firms are obliged to update any references given to authorised firms after March 2017 if new information comes to light during the period between providing a reference and when the individual leaves a firm or, for ex-employees, six years from the date the individual left the firm, which would change the reference they previously provided.
Difficult issues will arise where a firm uncovers misconduct after an employee has left which might lead to a change to the reference previously provided. The FCA has declined to give any guidance on whether employees should have a right of reply in such circumstances, arguing that this is a matter for employment lawyers.
4. Establish, implement and maintain policies and procedures that are adequate for the purposes of complying with the new regulatory references obligations
Banks and insurers will be under a specific obligation to retain disciplinary and fitness and propriety findings for six years in order to comply with the new regime.
Requirements for all firms
Although the new regulatory reference regime applies principally to banks and insurers, all regulated firms are subject to the requirement to disclose all information relevant to an individual's fitness and propriety on receipt of a request for a reference for a candidate for an approved role.
As well as introducing the regulatory reference regime, the FCA has clarified existing rules and attempted to bring them in line with the new regulatory reference regime. In summary, the amended rules do the following:
Limit the requirement to disclose "all relevant information" to the same time limit as required for the mandatory disclosures, which is six years from the date of the reference request. There is no guidance on what "all relevant information" means – firms will need to apply judgement on a case-by-case basis. However, firms will not be required to disclose information that has not been properly verified, nor should they do so.
Clarify that there is no time limit for disclosing "serious misconduct" in a reference, such as a serious breach of rules, misconduct that resulted in enforcement action by the regulators against the firm or misconduct that involved serious dishonesty.
What do you need to do next?
Banks and insurers will need to ensure that they are ready to implement the new regulatory reference rules on 7 March 2017.
All firms will need to review existing procedures and recording-keeping practices to bring them into line with the more onerous requirements of the new regime. There will also be an important training requirement to ensure that all staff are aware of the new obligations.
Firms will also need to review standard settlement agreement wording to ensure that they retain the power to amend and update agreed form references.
To discuss the new regulatory reference regime and the changes you may need to make within your organisation to ensure compliance, please contact Roger Bull or James Green.
Roger Bull Managing Partner
+44 (0) 117 902 2701 [email protected]
Strategic HR Projects
Subscribe to news and insight
Financial services regulation: updates for FCA and PRA regulated firms
Important updates on financial services regulation including the latest PRA and FCA rules and guidance, changes to the Handbook and Rulebook and upcoming developments in UK and European regulation
Employment law updates: important changes for employers
UK Supreme Court sets November hearing date for Morrisons data breach appeal
Burges Salmon careers
We work hard to make sure Burges Salmon is a great place to work. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 304 | [
128000,
3561,
38220,
15407,
25,
3339,
16369,
11429,
389,
34102,
198,
644,
6250,
220,
679,
21,
279,
393,
5726,
323,
435,
5158,
4756,
264,
1620,
743,
315,
5718,
389,
23331,
15407,
11,
2768,
264,
29173,
11887,
304,
6664,
220,
679,
20,
13,
578,
502,
5718,
2586,
1139,
5457,
389,
220,
22,
5587,
220,
679,
22,
627,
3561,
38220,
15407,
617,
1027,
11784,
311,
1520,
5471,
279,
1790,
1824,
50308,
4147,
330,
2827,
16404,
1,
315,
8420,
449,
8009,
6929,
7576,
1990,
35319,
19339,
13,
1102,
374,
10825,
430,
1521,
15407,
690,
7431,
23234,
311,
1304,
810,
16369,
323,
13687,
34102,
11429,
389,
279,
17479,
323,
21744,
2676,
315,
11426,
369,
10195,
13073,
323,
1023,
1401,
5865,
627,
23956,
19339,
527,
11754,
555,
279,
502,
5718,
5380,
3915,
5587
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
3561,
38220,
15407,
25,
3339,
16369,
11429,
389,
34102,
198,
644,
6250,
220,
679,
21,
279,
393,
5726,
323,
435,
5158,
4756,
264,
1620,
743,
315,
5718,
389,
23331,
15407,
11,
2768,
264,
29173,
11887,
304,
6664,
220,
679,
20,
13,
578,
502,
5718,
2586,
1139,
5457,
389,
220,
22,
5587,
220,
679,
22,
627,
3561,
38220,
15407,
617,
1027,
11784,
311,
1520,
5471,
279,
1790,
1824,
50308,
4147,
330,
2827,
16404,
1,
315,
8420,
449,
8009,
6929,
7576,
1990,
35319,
19339,
13,
1102,
374,
10825,
430,
1521,
15407,
690,
7431,
23234,
311,
1304,
810,
16369,
323,
13687,
34102,
11429,
389,
279,
17479,
323,
21744,
2676,
315,
11426,
369,
10195,
13073,
323,
1023,
1401,
5865,
627,
23956,
19339,
527,
11754,
555,
279,
502,
5718,
5380,
3915,
5587,
-100
] |
Education in Algeria
Title: Education in Algeria
Subject: Education in Africa, List of education articles by country, Ministry of National Education (Algeria), Education, Sociology of education
Collection: Education in Algeria
Education in Algeria الـتـعـليـم في الجـزائـر
Ministry of National Education
Primary languages
Arabic , French
Literacy (2008)
University of Béjaïa.
Education in Algeria is free and officially compulsory for Algerians up to age 16, but actual enrollment falls far short of 100 percent.[1] Enrollment drops off sharply from primary to secondary school.[1] In fact, only about half the eligible population is enrolled in secondary school, which consists of two three-year cycles beginning at age 12.[1] In addition, Algeria has: 34 Universities, 13 University Centers, 21 National Superior Institute, 8 Preparatory Institutes.[1]
The primary language of school instruction is the Arabic language|Arabic], but Berber-language instruction has been permitted since 2003, in part to ease reliance on foreign teachers but also in response to complaints about Arabization.[1] Due to Algeria's French colonial past, French is the first foreign language taught in all schools and is often the medium of instruction in post-secondary programs as well as private schools. Most educated Algerians are in turn bilingual in both Arabic and French.
As of 2008, Algeria's literacy rate is 69–70 percent, higher than those of Morocco and Egypt but subpar by international standards.[1] The breakdown by gender is 79 percent for males and 61 percent for females.[1] A lag persists for women despite progress since independence in 1962. Education consumes one-quarter of the national budget.[1] Algeria faces a shortage of teachers as a result of the doubling in the number of eligible children and young adults in the last 12 years.[1]
Education by numbers
According to recent statistics of the Ministry of National Education for the 2009-2010 academic year
Preparatory school 427.913
Primary school 3.309.212
Medium school 3.052.953
Secondary school 1.170.645
Total 7.960.723
^ a b c d e f g h i Algeria country profile. Library of Congress Federal Research Division (May 2008). This article incorporates text from this source, which is in the public domain.
List of universities in Algeria
Education in Africa
States with limited
Sahrawi Arab Democratic Republic
Dependencies and
other territories
Canary Islands / Ceuta / Melilla / Plazas de soberanía (Spain)
Mayotte / Réunion (France)
Saint Helena / Ascension Island / Tristan da Cunha (United Kingdom)
Algeria topics
Classical period (Antiquity)
Medieval Muslim Algeria
Ottoman rule
French rule
Nationalism and resistance
1960s to 1980s
Municipalities (communes)
Council of the Nation
DRS (intelligence service)
People's National Assembly
Bank of Algeria
Dinar (currency)
List of Algerians
Education stubs
Algerian school stubs
Ministry of National Education (Algeria)
Algiers Province, Algeria, Education in Algeria, El Mouradia, Algiers | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 5,202 | [
128000,
40234,
304,
81341,
198,
3936,
25,
11930,
304,
81341,
198,
13317,
25,
11930,
304,
10384,
11,
1796,
315,
6873,
9908,
555,
3224,
11,
20214,
315,
5165,
11930,
320,
2149,
1414,
689,
705,
11930,
11,
97157,
315,
6873,
198,
6618,
25,
11930,
304,
81341,
198,
40234,
304,
81341,
17607,
100441,
14628,
100441,
24102,
100441,
100576,
100441,
10386,
78373,
101088,
100441,
40797,
100462,
100441,
11318,
198,
6349,
5050,
315,
5165,
11930,
198,
16352,
15823,
198,
7098,
69391,
1174,
8753,
198,
87115,
2826,
320,
1049,
23,
340,
31272,
315,
426,
978,
5697,
38672,
64,
627,
40234,
304,
81341,
374,
1949,
323,
19073,
65868,
369,
59609,
5493,
709,
311,
4325,
220,
845,
11,
719,
5150,
39148,
17503,
3117,
2875,
315,
220,
1041,
3346,
8032,
16,
60,
89084,
21701,
1022,
46473,
505
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
40234,
304,
81341,
198,
3936,
25,
11930,
304,
81341,
198,
13317,
25,
11930,
304,
10384,
11,
1796,
315,
6873,
9908,
555,
3224,
11,
20214,
315,
5165,
11930,
320,
2149,
1414,
689,
705,
11930,
11,
97157,
315,
6873,
198,
6618,
25,
11930,
304,
81341,
198,
40234,
304,
81341,
17607,
100441,
14628,
100441,
24102,
100441,
100576,
100441,
10386,
78373,
101088,
100441,
40797,
100462,
100441,
11318,
198,
6349,
5050,
315,
5165,
11930,
198,
16352,
15823,
198,
7098,
69391,
1174,
8753,
198,
87115,
2826,
320,
1049,
23,
340,
31272,
315,
426,
978,
5697,
38672,
64,
627,
40234,
304,
81341,
374,
1949,
323,
19073,
65868,
369,
59609,
5493,
709,
311,
4325,
220,
845,
11,
719,
5150,
39148,
17503,
3117,
2875,
315,
220,
1041,
3346,
8032,
16,
60,
89084,
21701,
1022,
46473,
505,
-100
] |
Q: Symfony Form and different validation groups I have a form called UserType, which is used in my controller when creating a new user:
$newUser = new User();
$form = $this->createForm(UserType::class, $newUser);
$form->submit($request->request->all());
Now, I would like to also have an update route where a form is used. The form might be a different one, since some properties is not possible to change after creation. Because of this, I would also like different validations in the Entity. How do I pass different validation groups through the form in my controller?
A: With the Option Resolver You can pass the group name validation as an option and get It in the UserType
$newUser = new User();
$form = $this->createForm(UserType::class, $newUser, ['validation'=>'your_validation_group_name']);
$form->submit($request->request->all());
and in the UserType
public function buildForm(FormBuilderInterface $builder, array $options)
{
$builder
->add('username', TextType::class, [
'validation'=> $options['validation'] //contains your_validation_group_name
])
;
}
public function configureOptions(OptionsResolver $resolver)
{
$resolver->setDefaults(array(
'validation' => ''
));
}
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 5,601 | [
128000,
48,
25,
16398,
3459,
323,
2204,
10741,
5315,
358,
617,
264,
1376,
2663,
94472,
11,
902,
374,
1511,
304,
856,
6597,
994,
6968,
264,
502,
1217,
512,
46984,
1502,
284,
502,
2724,
545,
44345,
284,
400,
576,
405,
85758,
13388,
941,
487,
1058,
11,
400,
943,
1502,
317,
44345,
405,
6081,
703,
2079,
405,
2079,
405,
543,
5344,
7184,
11,
358,
1053,
1093,
311,
1101,
617,
459,
2713,
6149,
1405,
264,
1376,
374,
1511,
13,
578,
1376,
2643,
387,
264,
2204,
832,
11,
2533,
1063,
6012,
374,
539,
3284,
311,
2349,
1306,
9886,
13,
9393,
315,
420,
11,
358,
1053,
1101,
1093,
2204,
84488,
304,
279,
10606,
13,
2650,
656,
358,
1522,
2204,
10741,
5315,
1555,
279,
1376,
304,
856,
6597,
1980,
32,
25,
3161,
279,
7104
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48,
25,
16398,
3459,
323,
2204,
10741,
5315,
358,
617,
264,
1376,
2663,
94472,
11,
902,
374,
1511,
304,
856,
6597,
994,
6968,
264,
502,
1217,
512,
46984,
1502,
284,
502,
2724,
545,
44345,
284,
400,
576,
405,
85758,
13388,
941,
487,
1058,
11,
400,
943,
1502,
317,
44345,
405,
6081,
703,
2079,
405,
2079,
405,
543,
5344,
7184,
11,
358,
1053,
1093,
311,
1101,
617,
459,
2713,
6149,
1405,
264,
1376,
374,
1511,
13,
578,
1376,
2643,
387,
264,
2204,
832,
11,
2533,
1063,
6012,
374,
539,
3284,
311,
2349,
1306,
9886,
13,
9393,
315,
420,
11,
358,
1053,
1101,
1093,
2204,
84488,
304,
279,
10606,
13,
2650,
656,
358,
1522,
2204,
10741,
5315,
1555,
279,
1376,
304,
856,
6597,
1980,
32,
25,
3161,
279,
7104,
-100
] |
Department of Pediatrics, University of North Carolina at Chapel Hill, Chapel Hill, North Carolina.
Evaluating respiratory function in children, especially infants and preschoolers, is difficult because of lack of patient cooperation with and understanding of lung function testing. Because of recent advances in diagnostic tools, investigators are now able to assess normal lung physiology, the presence or absence of airway disease, and therapeutic interventions in this young age group. Recent advances in infant lung function testing, preschool spirometry, forced oscillation methods, and the interrupter respiratory resistance technique are discussed. Exhaled nitric oxide and carbon monoxide measurements in children are also reviewed. The technical aspects, advantages, disadvantages, and clinical applications of these tools are summarized. These remarkable advances have yet to be applied in multicenter trials with young children. Adhering to standards will be critical for future multicenter trials to assess the clinical utility of these potential outcome measures.
Stephanie D Davis MD presented a version of this report at the 31st Respiratory Care Journal Conference, Current Trends in Neonatal and Pediatric Respiratory Care, August 16-18, 2002, in Keystone, Colorado.
Copyright © 2003 by Daedalus Enterprises Inc. | {
"redpajama_set_name": "RedPajamaC4"
} | 2,129 | [
128000,
27725,
315,
99871,
11,
3907,
315,
4892,
13030,
520,
54462,
8270,
11,
54462,
8270,
11,
4892,
13030,
627,
36,
26591,
1113,
42631,
734,
304,
2911,
11,
5423,
42534,
323,
61905,
388,
11,
374,
5107,
1606,
315,
6996,
315,
8893,
23915,
449,
323,
8830,
315,
21271,
734,
7649,
13,
9393,
315,
3293,
31003,
304,
15439,
7526,
11,
26453,
527,
1457,
3025,
311,
8720,
4725,
21271,
78152,
11,
279,
9546,
477,
19821,
315,
3805,
3195,
8624,
11,
323,
37471,
39455,
304,
420,
3995,
4325,
1912,
13,
35390,
31003,
304,
31383,
21271,
734,
7649,
11,
61905,
28047,
442,
15501,
11,
9770,
43524,
367,
5528,
11,
323,
279,
12956,
261,
42631,
13957,
15105,
527,
14407,
13,
1398,
60985,
25719,
2265,
51180,
323,
12782,
1647,
55189,
22323,
304,
2911,
527,
1101,
22690
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
27725,
315,
99871,
11,
3907,
315,
4892,
13030,
520,
54462,
8270,
11,
54462,
8270,
11,
4892,
13030,
627,
36,
26591,
1113,
42631,
734,
304,
2911,
11,
5423,
42534,
323,
61905,
388,
11,
374,
5107,
1606,
315,
6996,
315,
8893,
23915,
449,
323,
8830,
315,
21271,
734,
7649,
13,
9393,
315,
3293,
31003,
304,
15439,
7526,
11,
26453,
527,
1457,
3025,
311,
8720,
4725,
21271,
78152,
11,
279,
9546,
477,
19821,
315,
3805,
3195,
8624,
11,
323,
37471,
39455,
304,
420,
3995,
4325,
1912,
13,
35390,
31003,
304,
31383,
21271,
734,
7649,
11,
61905,
28047,
442,
15501,
11,
9770,
43524,
367,
5528,
11,
323,
279,
12956,
261,
42631,
13957,
15105,
527,
14407,
13,
1398,
60985,
25719,
2265,
51180,
323,
12782,
1647,
55189,
22323,
304,
2911,
527,
1101,
22690,
-100
] |
Music We Like
[{"id":37086897045663,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"602547658647","requires_shipping":true,"taxable":true,"featured_image":null,"available":false,"name":"Into the Great Wide Open","public_title":null,"options":["Default Title"],"price":3000,"weight":454,"compare_at_price":null,"inventory_management":"shopify","barcode":"602547658647","requires_selling_plan":false,"selling_plan_allocations":[]}]
Tom Petty And The Heartbreakers Into The Great Wide Open on 180g LP
It's been 40 years since Tom Petty and his extraordinary band, The Heartbreakers, unleashed their eponymous debut in 1976. In the subsequent decades, Petty - both as a solo artist and as leader of the band - has sold over 80 million records worldwide, earned 18 Grammy nods and has been inducted into the Rock and Roll Hall of Fame. Petty's musical integrity and craft, not to mention his seemingly effortless flair for rapturous hooks, have remained constant despite ever-shifting musical trends, and his multi-generational fan base continues to swell. In the words of Rolling Stone's Alan Light, "The man's consistency is pretty astounding."
Following the sterling success of Tom Petty's 1989 solo debut Full Moon Fever, he and the Heartbreakers brought in the album's producer Jeff Lynne of ELO fame to also helm their eighth full-length offering Into The Great Wide Open in 1991. The highly stylized 12-track affair yielded the Petty evergreens "Learning To Fly" and "Into The Great Wide Open" (complete with a Johnny Depp-starring music video) and features Lynne on multiple instruments throughout as well as further guest appearances by fellow ELO bandmate Richard Tandy and The Byrds' Roger McGuinn.
1. Learning To Fly
2. Kings Highway
3. Into The Great Wide Open
4. Two Gunslingers
5. The Dark of the Sun
6. All Or Nothin'
7. All The Wrong Reasons
8. Too Good To Be Tru
9. Out In The Cold
10. You And I Will Meet Again
11. Makin' Some Noise
12. Built To Last
[email protected] | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 6,237 | [
128000,
25099,
1226,
9086,
198,
58,
5018,
307,
794,
14648,
25862,
21133,
10961,
5495,
1359,
2150,
3332,
3760,
11106,
2247,
2091,
16,
3332,
3760,
11106,
2247,
2091,
17,
794,
2994,
1359,
2091,
18,
794,
2994,
1359,
41029,
3332,
20224,
23215,
23654,
22644,
2247,
42475,
54653,
794,
1904,
1359,
18081,
481,
794,
1904,
1359,
37315,
5060,
794,
2994,
1359,
10547,
794,
3934,
1359,
609,
3332,
27689,
279,
8681,
33845,
5377,
2247,
898,
6240,
794,
2994,
1359,
2945,
37899,
3760,
11106,
69982,
6692,
794,
3101,
15,
1359,
4870,
794,
20555,
1359,
19484,
3837,
9217,
794,
2994,
1359,
32193,
46463,
3332,
8845,
1463,
2247,
65386,
3332,
20224,
23215,
23654,
22644,
2247,
42475,
646,
6427,
27662,
794,
3934,
1359,
38837,
27662,
15146,
811,
794,
1318,
58420,
25763,
95798,
1628,
578,
18449,
9137
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
25099,
1226,
9086,
198,
58,
5018,
307,
794,
14648,
25862,
21133,
10961,
5495,
1359,
2150,
3332,
3760,
11106,
2247,
2091,
16,
3332,
3760,
11106,
2247,
2091,
17,
794,
2994,
1359,
2091,
18,
794,
2994,
1359,
41029,
3332,
20224,
23215,
23654,
22644,
2247,
42475,
54653,
794,
1904,
1359,
18081,
481,
794,
1904,
1359,
37315,
5060,
794,
2994,
1359,
10547,
794,
3934,
1359,
609,
3332,
27689,
279,
8681,
33845,
5377,
2247,
898,
6240,
794,
2994,
1359,
2945,
37899,
3760,
11106,
69982,
6692,
794,
3101,
15,
1359,
4870,
794,
20555,
1359,
19484,
3837,
9217,
794,
2994,
1359,
32193,
46463,
3332,
8845,
1463,
2247,
65386,
3332,
20224,
23215,
23654,
22644,
2247,
42475,
646,
6427,
27662,
794,
3934,
1359,
38837,
27662,
15146,
811,
794,
1318,
58420,
25763,
95798,
1628,
578,
18449,
9137,
-100
] |
OffseasonOffseason
Free AgencyFree Agency
Hall of FameHall of Fame
All-Time StatsAll-Time Stats
As All-Star break approaches, questions about baseball fan safety persist
2yWillie Weinbaum
1dDavid Schoenfield
23hMLB Insiders
What pitching every fourth day would mean for Trevor Bauer and the team that signs him
29mBradford Doolittle
1dAlden Gonzalez
Lasorda memorialized in Dodger Stadium service
Our latest MLB offseason buzz: Second baseman market after LeMahieu, NL DH waiting game and more
2dJesse Rogers
MLB needs more Black managers. Here's why it won't be me right now
3dDoug Glanville
The MLB teams with the most serious work still to do this offseason
4dBuster Olney
Are the New York Mets done for the offseason?
BBTN: Jess Mendoza on the Mets firing Jared Porter. Plus, Padres manager Jayce Tingler on Snell, Tatis and the Dodgers
Fantasy baseball: George Springer finds a new home ... or does he?
20hTristan H. Cockcroft
ESPN Daily: Joel Embiid's evolution
William WeinbaumESPN
They were two of the most searing, disturbing images of the first half of the 2019 Major League Baseball season. A man with his arms enveloping a small girl, rushing up the stairs, through the crowd, so she could receive medical attention. And a Chicago Cubs player doubled over in horror at the effect of his high-speed line drive into the stands.
It happened May 29 at Houston's Minute Maid Park, when Albert Almora Jr.'s foul ball rifled just past the third-base dugout into an area unprotected by netting.
About two years earlier, in an eerily similar situation at Yankee Stadium, the New York Yankees' Todd Frazier hit a foul liner that left the bat at 105 mph and also struck a little girl just past the third-base dugout. That shot, on Sept. 20, 2017, inflicted life-threatening injuries on the nearly 2-year-old daughter of Geoff Jacobson.
Ex-commish Vincent hails ChiSox plan on netting
How one fan's story contributed to a conversation about MLB's safety netting
OTL: Coroner says Dodger fan killed by foul ball
At that point, all major league stadiums had safety netting from behind home plate to at least the near ends of the dugouts. Six months after the Jacobson injury, for Opening Day 2018, the netting at every MLB ballpark reached the far ends of the dugouts, and a couple of teams, including the Yankees, had extended their netting beyond that. After the ball crashed into the head of the girl in Houston, her family's attorney said the 2-year-old's injuries -- like those suffered by Jacobson's daughter -- included a fractured skull and bleeding on the brain. A visibly shaken Almora said after the game, "I want to put a net around the whole stadium."
"How unnecessary it is that somebody has to go through this again," Jacobson told ESPN. "Another girl gets hurt and maybe this is what makes them go the distance and go to the foul poles [with netting extensions] and make them higher and just try to make it legitimately safe."
Almora's foul ball intensified the debate about whether commissioner Rob Manfred should take the unprecedented step of ordering teams to act on the issue. In the five weeks since the incident in Houston, two hard-hit foul balls, one at Chicago's Guaranteed Rate Field and one at Dodger Stadium, struck fans in the head and resulted in them being sent to the hospital, and fans, commentators and politicians have called for MLB to mandate netting to the foul poles for all 30 teams.
At a June 20 media briefing, Manfred said ballparks' design differences won't allow for a "one size fits all" rule regarding netting, and that it would be difficult in the middle of a season to require significant construction projects. But he said he supports netting extensions, which a handful of teams have announced intentions to install.
The White Sox on June 18 became the first team in Major League Baseball to commit to have netting run all the way to the foul poles.
White Sox executive vice president Howard Pizer told ESPN that, in addition to the danger of balls leaving the bat at speeds that can exceed 100 miles per hour, there's a big concern over fans being distracted by cellphones, scoreboards and other entertainment.
"Even though the idea of putting netting in front of your fans is not what you want to do, you need to do it," Pizer said "I don't think people would be honest if they don't say that they're more comfortable with the netting in terms of their own families' or their friends' security and safety."
Washington Nationals owner Mark Lerner, in a June 20 open letter to Nationals fans announcing plans to extend netting almost to the foul poles at Nationals Park, cited the Houston girl's injury. "I can't imagine what her parents must have felt in that moment," he said. "And to see the raw emotion and concern from Albert Almora Jr. was heartbreaking." The Nationals said they would extend the netting during the upcoming All-Star break.
The Texas Rangers, who extended netting to the far ends of the dugouts before most teams, said in May they plan to have it reach another 100 feet or so, almost to the foul poles, in their new park scheduled to open next season.
Rangers executive vice president Rob Matwick said in an interview with ESPN that, despite the oft-heard arguments against increased netting -- that fans don't want obstructed views and do want to be able to catch foul balls and interact with players -- the Rangers' experience to date is instructive. "Initially there was some customer pushback, but I think we've been able to overcome that over time. Once fans adjusted and got used to it, we really haven't had any issues."
A national poll conducted by ESPN found that 78 percent of fans favor increased netting.
Matwick also said improvements in the netting over the years are a key factor: "The netting that we use today really does a pretty good job of blending into the background when you look through."
The original impetus for netting extensions during Manfred's tenure was a gruesome scene in 2015, his first year on the job. Tonya Carpenter, a woman seated between the backstop and the third-base dugout at Fenway Park, was hit in the head and bloodied by a broken bat. She was wheeled out on a stretcher and taken to a Boston hospital to undergo emergency brain surgery.
Manfred then ordered MLB to study fan safety. Following that study's completion -- and other fan injuries that season, including at Fenway -- he issued a recommendation of netting extensions to the near ends of the dugouts. All teams complied by the start of the 2016 season.
MLB hasn't revealed the results of that 2015 study, or other information it has since compiled on the subject. Manfred said at his June briefing that MLB has gathered data on fan injuries for the past three to four years, but when asked by ESPN why the league hasn't released it, he said, "We collect all sorts of data that we don't release to the public. That's sort of the way people do business in America. We make no secret of fan incidents, usually the public is there when it happens."
In a May 15, 2019, affidavit obtained by ESPN, a high-ranking MLB official said details of the 2015 safety study are "privileged" and should be kept confidential. The affidavit was submitted in connection with an ongoing lawsuit filed by a fan who lost his vision in one eye after he was struck by a foul ball at Wrigley Field in 2017.
MLB and its teams have leaned on the so-called "Baseball Rule" to discourage or defeat litigation over injuries on balls or bats landing in the stands. Since 1913, every ticket to an MLB game has contained a disclaimer saying fans assume all the risks inherent to the game.
Manfred said in June that MLB believes the baseballs in use this season have less drag, a factor in the surge in home runs and in reducing the time that fans have to react to foul balls headed toward them. He said scientists retained by MLB are working to determine what has caused the change.
On June 27, Illinois's two U.S. Senators wrote Manfred a letter saying, "MLB and every team should expedite plans to extend netting to further protect fans. As several teams have demonstrated, these safety improvements don't have to wait until next season." In his June 28 response letter, obtained by ESPN, Manfred wrote, "Over the past several years, our Clubs have vastly increased the amount of protective netting -- and, as a result, the inventory of available seats behind protective netting -- in their ballparks. I am continuing to encourage Clubs to go even further, while taking into account the structural variations in the ballparks."
A Bloomberg News study in 2014 found that 1,750 fans a year were injured by foul balls, but stadium netting has been significantly extended since then. Manfred said at the June briefing the extensions have made fans safer because the netting is blocking balls, and fewer are reaching the stands -- but he said he couldn't be any more precise than that. A league source who spoke to ESPN on the condition of anonymity said MLB has data on foul balls and has team-provided figures on fan injuries, but not statistics on the connection between the two.
Last August, Linda Goldbloom was seated in the loge behind home plate at Dodger Stadium, just above netting. A foul ball struck her in the head and she suffered a fatal brain hemorrhage. The Goldbloom family has since been advocating for longer and higher netting. After the fan was struck Dodger Stadium last month, the team announced that it had already begun a study of possible adjustments to its netting.
Jacobson, who said his daughter is recovering nicely from her 2017 injuries, has also been outspoken about extended netting at parks.
"People are coming, taking their families to watch a sporting event," Jacobson said. "There shouldn't be a fear of getting hurt or getting killed.
"Sadly right now, part of the story is that more people have gotten hurt and another little girl just like her has been injured," Jacobson said. "And you can only pray that that girl's story has as good of an ending as my daughter's story." | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 2,478 | [
128000,
4699,
17217,
4699,
17217,
198,
11180,
16784,
11180,
16784,
198,
72945,
315,
39627,
72945,
315,
39627,
198,
2460,
55585,
31027,
2460,
55585,
31027,
198,
2170,
2052,
39884,
1464,
20414,
11,
4860,
922,
20075,
8571,
7296,
23135,
198,
17,
88,
10149,
648,
71613,
59611,
198,
16,
67,
23083,
57284,
268,
2630,
198,
1419,
71,
2735,
33,
9925,
13572,
198,
3923,
47541,
1475,
11999,
1938,
1053,
3152,
369,
54651,
79701,
323,
279,
2128,
430,
12195,
1461,
198,
1682,
76,
62881,
8350,
423,
1786,
2433,
198,
16,
67,
32,
509,
268,
52186,
198,
44903,
58180,
39017,
1534,
304,
36968,
1414,
23462,
2532,
198,
8140,
5652,
41217,
40972,
31527,
25,
10657,
84403,
3157,
1306,
2009,
47308,
26235,
11,
33260,
33887,
8748,
1847,
323,
810,
198,
17,
67,
41,
24201,
34467,
198
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
4699,
17217,
4699,
17217,
198,
11180,
16784,
11180,
16784,
198,
72945,
315,
39627,
72945,
315,
39627,
198,
2460,
55585,
31027,
2460,
55585,
31027,
198,
2170,
2052,
39884,
1464,
20414,
11,
4860,
922,
20075,
8571,
7296,
23135,
198,
17,
88,
10149,
648,
71613,
59611,
198,
16,
67,
23083,
57284,
268,
2630,
198,
1419,
71,
2735,
33,
9925,
13572,
198,
3923,
47541,
1475,
11999,
1938,
1053,
3152,
369,
54651,
79701,
323,
279,
2128,
430,
12195,
1461,
198,
1682,
76,
62881,
8350,
423,
1786,
2433,
198,
16,
67,
32,
509,
268,
52186,
198,
44903,
58180,
39017,
1534,
304,
36968,
1414,
23462,
2532,
198,
8140,
5652,
41217,
40972,
31527,
25,
10657,
84403,
3157,
1306,
2009,
47308,
26235,
11,
33260,
33887,
8748,
1847,
323,
810,
198,
17,
67,
41,
24201,
34467,
198,
-100
] |
Be among the first to experience the calming majesty of Woodside. Sign up for updates about Woodside wellness retreat.
Nestled in forested hills, this year-round retreat provides an intimate and immersive experience with just 38 rooms and surrounding sun-dappled trails. Meet beside a crackling fire in the lodge, sip coffee on a treehouse deck under a canopy of ancient redwoods, dine on nutritious and dietary-friendly entrees created with thoughtfully sourced ingredients.
Wander secluded paths and play outdoors. The one-of-a-kind obstacle course puts the thrill back into routine workouts.
Raise your heart rate or lower into down dog – fitness and movement classes focus on performance and prevention.
Gather at the community table for meals made to your preferences. Vegan, pescatarian, paleo – from us to your plate.
Push boundaries on a solo vacation or with a group. Retreat options guide you toward deeper meaning and a larger impact.
Spend downtime indulging in signature Canyon Ranch treatments, including award-winning massages and facials. | {
"redpajama_set_name": "RedPajamaC4"
} | 4,794 | [
128000,
3513,
4315,
279,
1176,
311,
3217,
279,
78729,
24906,
41339,
315,
12404,
3002,
13,
7220,
709,
369,
9013,
922,
12404,
3002,
39890,
31114,
627,
45,
478,
839,
304,
13952,
291,
35231,
11,
420,
1060,
21691,
31114,
5825,
459,
32487,
323,
65280,
3217,
449,
1120,
220,
1987,
12295,
323,
14932,
7160,
1773,
680,
839,
33965,
13,
26911,
30488,
264,
17944,
2785,
4027,
304,
279,
60891,
11,
47715,
11033,
389,
264,
5021,
7830,
9722,
1234,
264,
64071,
315,
14154,
2579,
82129,
11,
66207,
389,
78216,
323,
34625,
22658,
1218,
8016,
3549,
449,
3463,
3725,
42211,
14293,
627,
54,
8363,
89115,
13006,
323,
1514,
34632,
13,
578,
832,
8838,
7561,
60806,
33287,
3388,
9711,
279,
54904,
1203,
1139,
14348,
46944,
627,
94201,
701,
4851,
4478,
477,
4827,
1139,
1523,
5679
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
3513,
4315,
279,
1176,
311,
3217,
279,
78729,
24906,
41339,
315,
12404,
3002,
13,
7220,
709,
369,
9013,
922,
12404,
3002,
39890,
31114,
627,
45,
478,
839,
304,
13952,
291,
35231,
11,
420,
1060,
21691,
31114,
5825,
459,
32487,
323,
65280,
3217,
449,
1120,
220,
1987,
12295,
323,
14932,
7160,
1773,
680,
839,
33965,
13,
26911,
30488,
264,
17944,
2785,
4027,
304,
279,
60891,
11,
47715,
11033,
389,
264,
5021,
7830,
9722,
1234,
264,
64071,
315,
14154,
2579,
82129,
11,
66207,
389,
78216,
323,
34625,
22658,
1218,
8016,
3549,
449,
3463,
3725,
42211,
14293,
627,
54,
8363,
89115,
13006,
323,
1514,
34632,
13,
578,
832,
8838,
7561,
60806,
33287,
3388,
9711,
279,
54904,
1203,
1139,
14348,
46944,
627,
94201,
701,
4851,
4478,
477,
4827,
1139,
1523,
5679,
-100
] |
I made these easy Fig and Almond Energy Bites to combat unfortunate cheese and crackers incidents.
These incidents occur most frequently at 4:45 p.m, when it's too early to be eating dinner, but my stomach is growling anyway. I tell myself that I need just a little something to tide me over until mealtime. Nothing so serious as a container of yogurt or protein bar—a few Ritz crackers should do the trick.
Flash forward 15-minutes, and I'm three quarters of the way through the first cracker sleeve, hungrier than when I started, and really I might as well bust out the cheese, because what are crackers without cheese?
Eventually, I am forced to cook, because my husband does not view "crackers" and "dinner" as synonymous—plus by this point, I've eaten all but one sad, broken cracker at the bottom of the box. By the time our real meal is ready, I'm no longer hungry. The crackers beat me again.
Fig and Almond Energy Bites are designed for the crucial moments when you need something to satisfy your appetite between meals and are a far better choice than a box of crackers or bag of chips. Healthy, perfectly portable, and filling, they make an easy on-the-go breakfast or snack. I even keep a few in a small container in my purse for long afternoons running errands. The Dunkin' Donuts drive-through is far less tempting when I'm full and happy.
The ingredients for Fig and Almond Energy Bites are simple and wholesome. I used a blend of rolled oats, dried figs, dates, flaxseeds, and almond butter. The almond and fig are a wonderful flavor combination, the dates provide natural sweetness, and the flax, oats, and almond butter add fiber and protein. They are vegan and gluten free too!
Once the ingredients are gathered, making the bites requires only two steps: blend and roll. I used the mini-work bowl insert of my KitchenAid® 13-Cup Food Processor. It's the perfect size to blend the ingredients and easy to clean too.
Once the ingredients are combined, they will form a delightful, lightly tacky mass. Channel your inner kid, because it's time to play with your food! Roll the energy bites into any size balls you like. I find that a one-inch diameter is the ideal size for a quick pre-workout snack, and when I need breakfast on the run, I'll grab two or three.
Now, all that remains is to eat. These bites can last in your fridge for two weeks, but don't be surprised when they vanish in two days.
Place all of the ingredients in the bowl of a KitchenAid® 13-Cup Food Processor fitted with a steel blade. Pulse a few times to loosely combine, then with a rubber spatula, scrape down the sides of the bowl. Blend and pulse for 2-3 minutes, until the mixture begins to clump and sticks to the sides of the bowl, stopping to scrape down the bowl as needed.
Portion the mixture into your hands, then roll the mixture into any sized balls you like. Store in an airtight container in the refrigerator for up to two weeks.
I'm all about energy bites these days . . LOVE these!! can't wait to try this recipe! | {
"redpajama_set_name": "RedPajamaC4"
} | 8,444 | [
128000,
40,
1903,
1521,
4228,
23966,
323,
1708,
12669,
12634,
426,
3695,
311,
12896,
34707,
17604,
323,
94911,
24455,
627,
9673,
24455,
12446,
1455,
14134,
520,
220,
19,
25,
1774,
281,
749,
11,
994,
433,
596,
2288,
4216,
311,
387,
12459,
14177,
11,
719,
856,
23152,
374,
3139,
2785,
13971,
13,
358,
3371,
7182,
430,
358,
1205,
1120,
264,
2697,
2555,
311,
43038,
757,
927,
3156,
15496,
1712,
13,
12334,
779,
6129,
439,
264,
5593,
315,
55575,
477,
13128,
3703,
29096,
2478,
432,
11289,
94911,
1288,
656,
279,
14397,
627,
24818,
4741,
220,
868,
13703,
2142,
11,
323,
358,
2846,
2380,
32573,
315,
279,
1648,
1555,
279,
1176,
1589,
9881,
37253,
11,
18799,
7401,
1109,
994,
358,
3940,
11,
323,
2216,
358,
2643,
439,
1664,
21444,
704,
279
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
40,
1903,
1521,
4228,
23966,
323,
1708,
12669,
12634,
426,
3695,
311,
12896,
34707,
17604,
323,
94911,
24455,
627,
9673,
24455,
12446,
1455,
14134,
520,
220,
19,
25,
1774,
281,
749,
11,
994,
433,
596,
2288,
4216,
311,
387,
12459,
14177,
11,
719,
856,
23152,
374,
3139,
2785,
13971,
13,
358,
3371,
7182,
430,
358,
1205,
1120,
264,
2697,
2555,
311,
43038,
757,
927,
3156,
15496,
1712,
13,
12334,
779,
6129,
439,
264,
5593,
315,
55575,
477,
13128,
3703,
29096,
2478,
432,
11289,
94911,
1288,
656,
279,
14397,
627,
24818,
4741,
220,
868,
13703,
2142,
11,
323,
358,
2846,
2380,
32573,
315,
279,
1648,
1555,
279,
1176,
1589,
9881,
37253,
11,
18799,
7401,
1109,
994,
358,
3940,
11,
323,
2216,
358,
2643,
439,
1664,
21444,
704,
279,
-100
] |
Korea's latest geostationary weather satellite Chollian-2A transmitted its first images of Earth from orbit, the government said Tuesday.
According to the Ministry of Science and ICT, the satellite shot its first image of Earth and sent it to the Korea Aerospace Research Institute and the National Meteorological Satellite Center on Saturday.
The image from Chollian-2A was in color, unlike the black and white images captured by its predecessor, the Chollian-1. The Science Ministry said it could check the type of terrain on areas not covered in cloud through the image. Parts of Australia and China that are desert appeared to be more red-colored than other areas due to the sand. The ministry said it also spotted a tropical cyclone headed west from around Australia.
Image transmission comes about a month after the satellite, also known as the Geo-Kompsat-2A, reached its targeted geostationary orbit of 36,000 kilometers (22,369 miles) above the Earth's equator on Dec. 21. It took roughly 17 days for the Korean satellite to get to the intended orbit after launch on Dec. 5 from a space center in French Guiana.
The 2A will send weather information to ground stations in Asia from July after six months of testing, according to the Science Ministry.
The Chollian-2A is one of two follow-up satellites to the Chollian-1, Korea's first geostationary satellite launched in June 2010. While the first satellite was used to monitor weather and ocean color, the 2A will focus on monitoring space and terrestrial weather and the Chollian-2B will later check oceans and the atmospheric environment around the Korean Peninsula.
The 2A offers four times improved spatial resolution and faster data transmission speeds compared to its predecessor. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,733 | [
128000,
42,
61148,
596,
5652,
3980,
537,
367,
661,
9282,
24088,
921,
337,
92898,
12,
17,
32,
34699,
1202,
1176,
5448,
315,
9420,
505,
27605,
11,
279,
3109,
1071,
7742,
627,
11439,
311,
279,
20214,
315,
10170,
323,
75302,
11,
279,
24088,
6689,
1202,
1176,
2217,
315,
9420,
323,
3288,
433,
311,
279,
12126,
81965,
8483,
10181,
323,
279,
5165,
40732,
5848,
61657,
5955,
389,
7884,
627,
791,
2217,
505,
921,
337,
92898,
12,
17,
32,
574,
304,
1933,
11,
20426,
279,
3776,
323,
4251,
5448,
17439,
555,
1202,
40274,
11,
279,
921,
337,
92898,
12,
16,
13,
578,
10170,
20214,
1071,
433,
1436,
1817,
279,
955,
315,
25911,
389,
5789,
539,
9960,
304,
9624,
1555,
279,
2217,
13,
27399,
315,
8494,
323,
5734,
430,
527,
24521,
9922
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
42,
61148,
596,
5652,
3980,
537,
367,
661,
9282,
24088,
921,
337,
92898,
12,
17,
32,
34699,
1202,
1176,
5448,
315,
9420,
505,
27605,
11,
279,
3109,
1071,
7742,
627,
11439,
311,
279,
20214,
315,
10170,
323,
75302,
11,
279,
24088,
6689,
1202,
1176,
2217,
315,
9420,
323,
3288,
433,
311,
279,
12126,
81965,
8483,
10181,
323,
279,
5165,
40732,
5848,
61657,
5955,
389,
7884,
627,
791,
2217,
505,
921,
337,
92898,
12,
17,
32,
574,
304,
1933,
11,
20426,
279,
3776,
323,
4251,
5448,
17439,
555,
1202,
40274,
11,
279,
921,
337,
92898,
12,
16,
13,
578,
10170,
20214,
1071,
433,
1436,
1817,
279,
955,
315,
25911,
389,
5789,
539,
9960,
304,
9624,
1555,
279,
2217,
13,
27399,
315,
8494,
323,
5734,
430,
527,
24521,
9922,
-100
] |
You are here: Home1 / News2 / Company News3 / Bridgestone to supply tyres to Volta Trucks' electric truck pilot flee...
Bridgestone to supply tyres to Volta Trucks' electric truck pilot fleet
Date: 26th August 2020 Author: Andrew Bogie Comments: 0
Bridgestone is supplying the fully electric Volta Zero with 285/70R19.5 146/144M R-Steer 002 tyres on both front and rear axles (Photo: Bridgestone)
The Volta Zero launch vehicle will roll on Bridgestone truck tyres when it launches in an online event on Thursday 3 September 2020
Scandinavian start-up full-electric vehicle manufacturer Volta Trucks has signed a new tyre partnership with Bridgestone. The world's largest tyre manufacturer will fit its tyres to the first launch vehicle, which will be revealed at an online event on Thursday 3 September. The agreement also covers the supply of tyres to Volta's pilot vehicles, due to start evaluation with fleet operators in early 2021. Large logistics fleet operators have already signed-up to trial the Volta Zero, including DPD Group in the UK and Bring and Posten in Scandinavia, with orders also already being taken for the vehicle in both markets.
Bridgestone have supplied the Volta Zero with its 285/70R19.5 146/144M R-Steer 002 tyre for both front and rear axles. The tyre's steer pattern delivers an optimum performance for high-torque full-electric vehicles and thanks to its ribbed design tread pattern, the R-Steer tyre also offers significant tyre noise reduction. This is an important attribute for the Volta Zero that is designed predominantly for inner city usage, with its silent full-electric powertrain enabling it to operate in urban areas 24 hours a day, even with the most stringent noise pollution regulations.
Confirming the partnership, Andrea Manenti, vice president, North Region of Bridgestone, said: "The transportation industry is in rapid transformation and vehicles are becoming more and more CASE – connected, autonomous, shared and electric. We are proud to partner with Volta Trucks, an exciting new manufacturer of electric vehicles, as their demonstrator fleet of the Volta Zero hits the road for the first time.
"As a business, Bridgestone is committed to working with key partners in contributing to the future of mobility and creating new value for society. The work that we're doing alongside Volta Trucks is exactly that."
Rob Fowler, chief executive officer of Volta Trucks, concluded; "I'm delighted that Volta Trucks is partnering with Bridgestone for the supply of tyres to our launch and demonstrator fleet vehicles. As the manufacturer of the world's first purpose-built full-electric large commercial vehicle, we are pioneering in the electrification of commercial vehicles and I am pleased to work with an innovative and world-renowned tyre company like Bridgestone who can help support our early ambitions."
Volta Zero details
The Volta Zero is the world's first purpose-built full-electric 16-tonne vehicle designed for inner-city freight deliveries, reducing the environmental impact of freight deliveries in city centres. Designed from the ground up with an operating pure-electric range of 150-200km (95-125 miles), the company estimates the Volta Zero could eliminate 180,000 tonnes of CO2 by 2025.
Safety is also at the heart of Volta Trucks, with its ambition of being the safest large commercial vehicle manufacturer. The Volta Zero was designed for electric from the outset, which facilitates a step-change in vehicle and pedestrian safety. Thanks to the removal of the internal combustion engine, the operator of a Volta Zero sits in a central driving position, with a much lower seat height than a conventional truck. This combination, plus a glass house-style cab design, gives the driver a wide 220-degrees of visibility, minimising dangerous blind spots.
The first prototype Volta Zero is currently being built, and will be launched later in 2020, with the first pilot test vehicles due to start evaluation with customers in Q1-2021.
Volta Trucks is a start-up full-electric goods vehicle manufacturer and services company. Volta Trucks has offices in the UK and Sweden and has partnered with a number of industry-leading design and engineering companies to develop the Zero, including Prodrive, Astheimer and Magtec.
Bridgestone renames TomTom Telematics Webfleet Solutions
Bridgestone sees 42% increase in CV Show visitors
Giti Fleet SMART TPMS launched at CV Show 2019
Goodyear Total Mobility represents tailored, end-to-end offer for fleets
Andrea Manenti, Bridgestone, Bridgestone R-Steer, electric vehicles, featured, fleet, Fleet Business, truck tyres, Volta Trucks, Volta Zero
Two new e-bikes in Pirelli CYCL-e around rental service Pirelli Liqui Moly Liqui Moly becomes title sponsor of the MotoGP race in Teruel, Spain | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 6,811 | [
128000,
2675,
527,
1618,
25,
5492,
16,
611,
5513,
17,
611,
8351,
5513,
18,
611,
32437,
7114,
606,
311,
8312,
69793,
311,
11119,
2629,
86435,
6,
9249,
11092,
18178,
28500,
9522,
33,
1907,
7114,
606,
311,
8312,
69793,
311,
11119,
2629,
86435,
6,
9249,
11092,
18178,
26155,
198,
1956,
25,
220,
1627,
339,
6287,
220,
2366,
15,
7030,
25,
13929,
42648,
648,
18149,
25,
220,
15,
198,
33,
1907,
7114,
606,
374,
44413,
279,
7373,
9249,
11119,
2629,
18811,
449,
220,
15935,
14,
2031,
49,
777,
13,
20,
220,
10465,
14,
8929,
44,
432,
12,
21573,
261,
220,
6726,
69793,
389,
2225,
4156,
323,
14981,
3944,
645,
320,
10682,
25,
32437,
7114,
606,
340,
791,
11119,
2629,
18811,
7195,
7458,
690,
6638,
389,
32437,
7114,
606,
11092,
69793
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
2675,
527,
1618,
25,
5492,
16,
611,
5513,
17,
611,
8351,
5513,
18,
611,
32437,
7114,
606,
311,
8312,
69793,
311,
11119,
2629,
86435,
6,
9249,
11092,
18178,
28500,
9522,
33,
1907,
7114,
606,
311,
8312,
69793,
311,
11119,
2629,
86435,
6,
9249,
11092,
18178,
26155,
198,
1956,
25,
220,
1627,
339,
6287,
220,
2366,
15,
7030,
25,
13929,
42648,
648,
18149,
25,
220,
15,
198,
33,
1907,
7114,
606,
374,
44413,
279,
7373,
9249,
11119,
2629,
18811,
449,
220,
15935,
14,
2031,
49,
777,
13,
20,
220,
10465,
14,
8929,
44,
432,
12,
21573,
261,
220,
6726,
69793,
389,
2225,
4156,
323,
14981,
3944,
645,
320,
10682,
25,
32437,
7114,
606,
340,
791,
11119,
2629,
18811,
7195,
7458,
690,
6638,
389,
32437,
7114,
606,
11092,
69793,
-100
] |
The following is a partial list of portable air cleaners sold as "air purifiers" or ozone generators that can intentionally emit ozone. This list includes air cleaners sold primarily for residential use, plus some for commercial, in-vehicle, and personal use. Inclusion on this list is based on information available at the time of review. We are not aware of test results for these models using the UL 867 test protocol required by the air cleaner regulation. Until the testing required by the regulation is completed, we do not know if the ozone emitted will meet the 0.050 ppm limit specified in the UL 867 Standard. Exclusion from this list is not to be construed as endorsement by the California Air Resources Board. In-duct systems and other non-portable ozone generators are generally not listed here, with a few exceptions, but may generate potentially harmful levels of ozone. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,686 | [
128000,
791,
2768,
374,
264,
7276,
1160,
315,
23665,
3805,
75965,
6216,
439,
330,
1334,
4087,
12099,
1,
477,
77537,
44163,
430,
649,
37304,
17105,
77537,
13,
1115,
1160,
5764,
3805,
75965,
6216,
15871,
369,
20658,
1005,
11,
5636,
1063,
369,
8518,
11,
304,
12,
20347,
11,
323,
4443,
1005,
13,
763,
9134,
389,
420,
1160,
374,
3196,
389,
2038,
2561,
520,
279,
892,
315,
3477,
13,
1226,
527,
539,
8010,
315,
1296,
3135,
369,
1521,
4211,
1701,
279,
22931,
220,
26013,
1296,
11766,
2631,
555,
279,
3805,
32981,
19812,
13,
30070,
279,
7649,
2631,
555,
279,
19812,
374,
8308,
11,
584,
656,
539,
1440,
422,
279,
77537,
48042,
690,
3449,
279,
220,
15,
13,
16193,
64697,
4017,
5300,
304,
279,
22931,
220,
26013,
12028,
13,
1398,
9134
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
2768,
374,
264,
7276,
1160,
315,
23665,
3805,
75965,
6216,
439,
330,
1334,
4087,
12099,
1,
477,
77537,
44163,
430,
649,
37304,
17105,
77537,
13,
1115,
1160,
5764,
3805,
75965,
6216,
15871,
369,
20658,
1005,
11,
5636,
1063,
369,
8518,
11,
304,
12,
20347,
11,
323,
4443,
1005,
13,
763,
9134,
389,
420,
1160,
374,
3196,
389,
2038,
2561,
520,
279,
892,
315,
3477,
13,
1226,
527,
539,
8010,
315,
1296,
3135,
369,
1521,
4211,
1701,
279,
22931,
220,
26013,
1296,
11766,
2631,
555,
279,
3805,
32981,
19812,
13,
30070,
279,
7649,
2631,
555,
279,
19812,
374,
8308,
11,
584,
656,
539,
1440,
422,
279,
77537,
48042,
690,
3449,
279,
220,
15,
13,
16193,
64697,
4017,
5300,
304,
279,
22931,
220,
26013,
12028,
13,
1398,
9134,
-100
] |
BiblePlansVideos
Get the app {{#signedIn}} {{/signedIn}} {{^signedIn}}
{{#signedIn}} Profile {{/signedIn}} Help & Support
{{#signedIn}} Account SettingsSign Out {{/signedIn}} {{^signedIn}} Create AccountSign In {{/signedIn}}
Jeremiah 2:1-2
Jeremiah 2:1-3-1-3 The Message (MSG)
GOD's Message came to me. It went like this: "Get out in the streets and call to Jerusalem, 'GOD's Message! I remember your youthful loyalty, our love as newlyweds. You stayed with me through the wilderness years, stuck with me through all the hard places. Israel was GOD's holy choice, the pick of the crop. Anyone who laid a hand on her would soon wish he hadn't!'" GOD's Decree. * * *
Jeremiah 2:1-2 New American Standard Bible - NASB 1995 (NASB1995)
Now the word of the LORD came to me saying, "Go and proclaim in the ears of Jerusalem, saying, 'Thus says the LORD, "I remember concerning you the devotion of your youth, The love of your betrothals, Your following after Me in the wilderness, Through a land not sown.
Jeremiah 2:1-2 New Living Translation (NLT)
The LORD gave me another message. He said, "Go and shout this message to Jerusalem. This is what the LORD says: "I remember how eager you were to please me as a young bride long ago, how you loved me and followed me even through the barren wilderness.
Jeremiah 2:1-2 King James Version (KJV)
Moreover the word of the LORD came to me, saying, Go and cry in the ears of Jerusalem, saying, Thus saith the LORD; I remember thee, the kindness of thy youth, the love of thine espousals, when thou wentest after me in the wilderness, in a land that was not sown.
Jeremiah 2:1-2 New Century Version (NCV)
The LORD spoke his word to me, saying: "Go and speak to the people of Jerusalem, saying: This is what the LORD says: 'I remember how faithful you were to me when you were a young nation. You loved me like a young bride. You followed me through the desert, a land that had never been planted.
Jeremiah 2:1-2 American Standard Version (ASV)
And the word of Jehovah came to me, saying, Go, and cry in the ears of Jerusalem, saying, Thus saith Jehovah, I remember for thee the kindness of thy youth, the love of thine espousals; how thou wentest after me in the wilderness, in a land that was not sown.
Jeremiah 2:1-2 New International Version (NIV)
The word of the LORD came to me: "Go and proclaim in the hearing of Jerusalem: "This is what the LORD says: " 'I remember the devotion of your youth, how as a bride you loved me and followed me through the wilderness, through a land not sown.
Jeremiah 2:1-2 New King James Version (NKJV)
Moreover the word of the LORD came to me, saying, "Go and cry in the hearing of Jerusalem, saying, 'Thus says the LORD: "I remember you, The kindness of your youth, The love of your betrothal, When you went after Me in the wilderness, In a land not sown.
Jeremiah 2:1-2 Amplified Bible (AMP)
Now the word of the LORD came to me saying, "Go and proclaim in the ears of Jerusalem, saying, 'Thus says the LORD, "I remember [earnestly] the lovingkindness and devotion of your youth, Your time of betrothal [like that of a bride during the early years in Egypt and again at Sinai], When you followed Me in the wilderness, Through a land not sown.
Jeremiah 2:1-2 English Standard Version 2016 (ESV)
The word of the LORD came to me, saying, "Go and proclaim in the hearing of Jerusalem, Thus says the LORD, "I remember the devotion of your youth, your love as a bride, how you followed me in the wilderness, in a land not sown.
Encouraging and challenging you to seek intimacy with God every day.
Bible Versions (2,888)
Bible Languages (1,922)
A digital ministry of
YouVersion uses cookies to personalize your experience. By using our website, you accept our use of cookies as described in our Privacy Policy. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 9,225 | [
128000,
33,
1260,
98828,
56206,
198,
1991,
279,
917,
5991,
2,
2264,
644,
3500,
5991,
14,
2264,
644,
3500,
5991,
61,
2264,
644,
11498,
3052,
2,
2264,
644,
3500,
12609,
5991,
14,
2264,
644,
3500,
11736,
612,
9365,
198,
3052,
2,
2264,
644,
3500,
8785,
11548,
7412,
4470,
5991,
14,
2264,
644,
3500,
5991,
61,
2264,
644,
3500,
4324,
8785,
7412,
763,
5991,
14,
2264,
644,
11498,
45057,
65945,
220,
17,
25,
16,
12,
17,
198,
45057,
65945,
220,
17,
25,
16,
12,
18,
12,
16,
12,
18,
578,
4961,
320,
20146,
340,
38,
2114,
596,
4961,
3782,
311,
757,
13,
1102,
4024,
1093,
420,
25,
330,
1991,
704,
304,
279,
14708,
323,
1650,
311,
26523,
11,
364,
38,
2114,
596,
4961,
0,
358,
6227,
701,
65655,
32883
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
33,
1260,
98828,
56206,
198,
1991,
279,
917,
5991,
2,
2264,
644,
3500,
5991,
14,
2264,
644,
3500,
5991,
61,
2264,
644,
11498,
3052,
2,
2264,
644,
3500,
12609,
5991,
14,
2264,
644,
3500,
11736,
612,
9365,
198,
3052,
2,
2264,
644,
3500,
8785,
11548,
7412,
4470,
5991,
14,
2264,
644,
3500,
5991,
61,
2264,
644,
3500,
4324,
8785,
7412,
763,
5991,
14,
2264,
644,
11498,
45057,
65945,
220,
17,
25,
16,
12,
17,
198,
45057,
65945,
220,
17,
25,
16,
12,
18,
12,
16,
12,
18,
578,
4961,
320,
20146,
340,
38,
2114,
596,
4961,
3782,
311,
757,
13,
1102,
4024,
1093,
420,
25,
330,
1991,
704,
304,
279,
14708,
323,
1650,
311,
26523,
11,
364,
38,
2114,
596,
4961,
0,
358,
6227,
701,
65655,
32883,
-100
] |
Home page > Magazine > Symbolism > The Three Dice of The Juggler
The Three Dice of The Juggler
Jacob's Ladder in the Tarot de Marseille
CAMOIN MAGAZINE
by Philippe Camoin
The Rebuilding of the Tarot de Marseille by Alexandre Jodorowsky and myself let us put back the three dice which had disappeared. Here are some explanations of this unexpected Rebuilding.
The card Le Mat has no number; the number of numbered Major Arcana is 21. Twenty-one happens to be divisible only by 3 and 7. Thus from the beginning the Ancients wanted us to pay attention to the numbers 3 and 7 as they were connected with the Sacred world, the world of the Major Arcana. Meanwhile, the world of the Minor Arcana is divided into 4 groups: this is the world of the Quaternary, the world of Four.
In the Tarot, 56 is the number of Minor Arcana and 21 the number of Major Arcana carrying a roman numeral. The number of combinations possible with three dice is 56 (exactly the number of Minor Arcana). The number of combinations possible with two dice is 21 (exactly the number of numbered Major Arcana). If we add the dots on a single die, we get 1+2+3+4+5+6=21 once again.
On the table of the Juggler, each die shows us three sides: 1+2+4=7. There is no other solution but 1, 2, and 4 to get 7 from three sides of a single die. There are three dice, which gives us 3x7=21.
Finally, if you add each side of a die with the opposite side, you get:
Once again we have 3x7.
Hexagone formé par les 6 chiffres
Moreover, this series of numbers forms, when placed on a hexagon, a serpent biting its own tail.
1 is the head of the serpent and 6 is its tail. The head eats the tail, meaning that 1 becomes 6. Let us overlap the 1 and the 6 and begin again with the 6 for a new round. We arrive at 11. In doing the same starting with 11, we arrive at 16. In repeating once more, we arrive at 21. We have finished our voyage through the 21 Major Arcana.
We have obtained 1, 6, 11, 16 and 21 as knots in the movement of the serpent Ouroboros. Let us align the corresponding Arcana:
The Juggler and Strength each have a hat in the form of the infinity sign (the eight on its side). But then, what is the connection with the World, which is at the other end? In fact, 1, 11 et 21 are the two extremities and the center.
The Two Infinities
In The World, there are two infinities. In the card of The World, the two yellow ribbons which tie the light blue mandorla (oval) at the top and the bottom each form a sideways eight of which only part is visible, the other part being hidden by the mandorla. The World contains the two infinities of the Juggler and Strength. In fact, The Juggler begins the first cycle of ten, from 1 to 10, just as Strength begins the second cycle of ten, from 11 to 20. Each cycle of ten begins with an infinity. This makes 20 cards, leaving one, The World, which is the totality of the two cycles, as shown by the fact that it has the two infinities.
Cards 1, 11 and 21 thus suggest to us the symbol of infinity. Let us place the 21 numbers on this infinity symbol which passes through 1, 11 and 21. The two series of 10 are then juxtaposed like in a mirror.
©Copyright Philippe Camoin - 2000
Le Christ et les Armes du Christ (Arma Christi) ou instruments de la Passion
On remarque les 3 dés au centre de la gravure de 1485
Tarot and Symbolism
Dice are among the Weapons of Christ or "Arma Christi": objects connected to the death of Christ on the cross. Roman Soldiers are said to have cast dice betting over the tunic of Christ. It is difficult to imagine that these dice in the Bible did not have a high symbolic and numerical value.
Tarot and Alchemy
GRAVURE ALCHIMIQUE
Tirée de "Atalanta Fugiens" de Michael Maier
It was Fulcanelli, in The Dwellings of the Philosophers, who best depicted the connection between the dice and Alchemy. The etymology of the word "die/dice" comes from a Greek word meaning a die for play, or a cube. Esoterically the die therefore can represent the cube or cut stone, the philosopher's stone, the cornerstone of the chuch.
A die had to be cast three times on the table, which corresponds to the three dice on the table. Symbolically, these three times will come to represent three different ways on the path—or three different worlds one could say—three initiations, three goals to attain. In alchemy, this is equivalent to dissolving the stone three times, "to obtain it with all its qualities". Nicolas Flamel tells us in this connection that this gives the solution to the hieroglyphic book of Abraham the Jew, composed of three times seven pages. A splendid illuminated manuscript, Fulcanelli tells us, executed at the beginning of the 18th century, contains 21 painted figures, each adapted to the twenty-one operations of the work.
To read the excerpt from Fulcanelli, click here: LE DÉ À JOUER | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 4,537 | [
128000,
7778,
2199,
871,
22168,
871,
20185,
2191,
871,
578,
14853,
57745,
315,
578,
622,
2661,
1565,
198,
791,
14853,
57745,
315,
578,
622,
2661,
1565,
198,
95267,
596,
445,
21473,
304,
279,
24912,
354,
409,
88793,
198,
49413,
46,
691,
50620,
24476,
4069,
198,
1729,
67954,
8215,
2003,
198,
791,
1050,
24177,
315,
279,
24912,
354,
409,
88793,
555,
90154,
622,
50017,
4336,
8050,
323,
7182,
1095,
603,
2231,
1203,
279,
2380,
22901,
902,
1047,
29496,
13,
5810,
527,
1063,
41941,
315,
420,
16907,
1050,
24177,
627,
791,
3786,
2009,
7011,
706,
912,
1396,
26,
279,
1396,
315,
49926,
17559,
20267,
3444,
374,
220,
1691,
13,
44956,
19101,
8741,
311,
387,
76016,
1193,
555,
220,
18,
323,
220,
22,
13,
14636,
505,
279,
7314,
279,
31377,
4167
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
7778,
2199,
871,
22168,
871,
20185,
2191,
871,
578,
14853,
57745,
315,
578,
622,
2661,
1565,
198,
791,
14853,
57745,
315,
578,
622,
2661,
1565,
198,
95267,
596,
445,
21473,
304,
279,
24912,
354,
409,
88793,
198,
49413,
46,
691,
50620,
24476,
4069,
198,
1729,
67954,
8215,
2003,
198,
791,
1050,
24177,
315,
279,
24912,
354,
409,
88793,
555,
90154,
622,
50017,
4336,
8050,
323,
7182,
1095,
603,
2231,
1203,
279,
2380,
22901,
902,
1047,
29496,
13,
5810,
527,
1063,
41941,
315,
420,
16907,
1050,
24177,
627,
791,
3786,
2009,
7011,
706,
912,
1396,
26,
279,
1396,
315,
49926,
17559,
20267,
3444,
374,
220,
1691,
13,
44956,
19101,
8741,
311,
387,
76016,
1193,
555,
220,
18,
323,
220,
22,
13,
14636,
505,
279,
7314,
279,
31377,
4167,
-100
] |
INTERFERENCE. UNIQUE ANGLED PROTECTOR SHIELDS THE FLAP AND HINGE.
We Apex Corporation are one of the Pakistan largest Manufacturers & Exporters of BEAUTY INSTRUMENT, DENTAL INSTRUMENT, SURGICAL INSTRUMENT and VETERINARY INSTRUMENT Products. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,742 | [
128000,
16321,
37,
19324,
13,
73450,
2147,
38,
13953,
5421,
2505,
27371,
6570,
34559,
3247,
13062,
2599,
3651,
473,
1753,
36,
627,
1687,
84455,
13332,
527,
832,
315,
279,
17076,
7928,
47198,
612,
22981,
388,
315,
7354,
58376,
56,
2006,
6805,
18380,
11,
423,
1863,
984,
2006,
6805,
18380,
11,
53083,
38,
15942,
2006,
6805,
18380,
323,
650,
20856,
33693,
2006,
6805,
18380,
15899,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
16321,
37,
19324,
13,
73450,
2147,
38,
13953,
5421,
2505,
27371,
6570,
34559,
3247,
13062,
2599,
3651,
473,
1753,
36,
627,
1687,
84455,
13332,
527,
832,
315,
279,
17076,
7928,
47198,
612,
22981,
388,
315,
7354,
58376,
56,
2006,
6805,
18380,
11,
423,
1863,
984,
2006,
6805,
18380,
11,
53083,
38,
15942,
2006,
6805,
18380,
323,
650,
20856,
33693,
2006,
6805,
18380,
15899,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
We value your Questions and Comments, and we will answer you as soon as we can.
Your Email Address* A value is required.This is not a valid email address.
Please confirm your email* A value is required.The e-mail addresses don't match.
characters remainingPlease enter your question between 10 and 300 characters.Please enter your question between 10 and 300 characters.Please enter your question with between 10 and 300 characters. | {
"redpajama_set_name": "RedPajamaC4"
} | 7,306 | [
128000,
1687,
907,
701,
24271,
323,
18149,
11,
323,
584,
690,
4320,
499,
439,
5246,
439,
584,
649,
627,
7927,
8463,
9356,
9,
362,
907,
374,
2631,
29845,
374,
539,
264,
2764,
2613,
2686,
627,
5618,
7838,
701,
2613,
9,
362,
907,
374,
2631,
11829,
384,
11724,
14564,
2765,
263,
956,
2489,
627,
48585,
9861,
5618,
3810,
701,
3488,
1990,
220,
605,
323,
220,
3101,
5885,
82927,
3810,
701,
3488,
1990,
220,
605,
323,
220,
3101,
5885,
82927,
3810,
701,
3488,
449,
1990,
220,
605,
323,
220,
3101,
5885,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
1687,
907,
701,
24271,
323,
18149,
11,
323,
584,
690,
4320,
499,
439,
5246,
439,
584,
649,
627,
7927,
8463,
9356,
9,
362,
907,
374,
2631,
29845,
374,
539,
264,
2764,
2613,
2686,
627,
5618,
7838,
701,
2613,
9,
362,
907,
374,
2631,
11829,
384,
11724,
14564,
2765,
263,
956,
2489,
627,
48585,
9861,
5618,
3810,
701,
3488,
1990,
220,
605,
323,
220,
3101,
5885,
82927,
3810,
701,
3488,
1990,
220,
605,
323,
220,
3101,
5885,
82927,
3810,
701,
3488,
449,
1990,
220,
605,
323,
220,
3101,
5885,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Tracking LeBron James' scoring chase
2023 NFL Draft rankings
Trade deadline big board
Evan Bouchard subscriber Q&A: Training with Darnell Nurse, adjusting to the NHL and the 'Bouch Bomb'
By Daniel Nugent-Bowman
It's only two games into the season, but Evan Bouchard is quickly making his presence felt on the Oilers blue line.
He played more than 39 minutes over the course of the team's first two victories, with more than 10 of those minutes coming shorthanded. Only Darnell Nurse has spent more time on the ice for the Oilers in that situation — and the gap is just six seconds.
Coach Dave Tippett said Bouchard was going to be the X-factor to the success of the defence this season, and the soon-to-be 22-year-old is off to a sound start in making good on that assessment.
So, what better time to ask him some of your questions?
Bouchard took some time to answer your submissions ahead of Tuesday's game against the Ducks.
(Note: Some questions were altered for clarity or shortened to avoid redundancy.)
What is the biggest challenge you had to overcome to make it to the NHL? — Jake
My biggest challenge was going from minor hockey to playing junior in London and not getting any ice time. I went from playing a lot to not really playing at all — and then it happened again last season with me. But luckily, I've been through that already and knew how to handle it.
How was handling the mental stress of being on the taxi squad last year? Does being around the team but not playing every night affect how you feel you fit in/social dynamics within the team? — Brandon W.
I found it was honestly really good last year with (the team) keeping everyone involved and stuff like that. But it was tough. You always want to be in the lineup and playing. But being around the team and having other people go through it with you kind of makes it a little bit easier.
What was your favourite memory of playing overseas last season? — Mark W.
I think living a new lifestyle. It was different. I've had the opportunity to go to Sweden (with the Oilers in October 2018), but I never lived there on my own. But the lifestyle change and meeting new friends over there was pretty cool.
What is your best attribute other than your bomb of a shot? — Jake
I think passing and smarts are the two there for me. I think smarts and passing kind of go hand in hand, knowing where to put the puck and stuff like that.
Is calling your shot the "Bouch Bomb" approved by you? — Travis B.
(Laughs.) Yeah, I don't mind it. It's pretty funny. I got a good laugh when I heard the first time. Now that it's stuck around, hopefully I can make it stick for a while.
Thinking back to that sneaky fake slap and snipe of a wrister goal you had on Vancouver last season, between slap shots and wristers, which do you personally feel more comfortable with when taking shots from the blue line? — Sean A.
That's tough. There are two different times to use it. The one I definitely use the most is the snap shot. It's the quickest to get off and it tends to be a little more accurate. But I love letting go of a couple slap shots.
What is the hardest adjustment for you as you establish yourself as an everyday player? — Peter M.
Hmm. That's a tough one. I'd say it's always practice habits and working on every day. Nothing's given to you at this level. You have to work at it every day, on and off the ice. Taking the practice habits up an extra notch and making sure you're ready for the games is a huge thing.
If you could steal one skill from a fellow Oilers defenceman, what would it be? — Nik G.
I'd probably say (Darnell) Nurse's skating. He's a workhorse out there. I don't think there are many guys around that are as fast as he is.
How was training with Darnell Nurse this summer? How did that come about? — Adrian D.
It was awesome. It came up because I've been skating at this place (The Pond in Burlington, Ont.) for a while now, and so was Nurse. One day, I think he went in the day before me. The instructor (Michele Moore) told me that he was there. He ended up texting me and telling me to come out and skate with him. Since then, I went out with him a bunch of times. It helped me grow a lot. That's kind of how it came about.
What is your favourite kind of pizza? Who would win in an arm wrestle between you and Darnell Nurse? — Chappy M.
(Laughs.) It's a no-brainer about the arm wrestle. It's Nurse 100 times out of 100. So, there's no competition there.
For pizza, I would say a meat lover's pizza is my favourite, with ranch dipping sauce with a thin crust. A cheesy crust is always good, too.
Cat or dog? — Stacy C.
Dog, for sure. I grew up with dogs in my family. I don't have a dog myself. Hopefully, in the next year or two, I can get one. But I don't have one right now.
I had a Golden (Retriever) when I was very young. Most of my life was a Bernese Mountain Dog. I grew up with bigger dogs.
You may or may not know, but some Oilers fans refer to you as "Dad," mostly because of your chiselled looks despite being 21 years old (22 on Wednesday). With that said, if you could offer any Dad advice, what would it be? — Taylor B.
(Laughs.) That I have no idea. I guess keep a clean shave, so no one thinks you're a dad!
What was the last album you listened to that really blew you away? What is one of your favourite all-time albums and bands? — Theodore N.
An album that I really liked was Post Malone's from a few summers ago – Beerbongs & Bentleys. I think that was on repeat all summer. Recently, I'm a huge Drake fan, so I can't go wrong with his albums — all of them. And I don't mind a good country song.
Are you going to keep the number 75 or switch it? If so, then what number? — Krzysiu W.
I was planning on switching to number 2 this season. And then, of course, when Duncs (Duncan Keith) came in, that's his number. So, I didn't get the opportunity to change that. But I think within the next couple of years, hopefully I can switch from number 75 to something else. I'm not quite sure yet what I would go to, but it was supposed to be number 2 do, but that obviously didn't happen. A lower number is what I'm thinking.
When and why did you decide to play defence? — Jon L.
When I was very young, maybe six or seven. My parents (Gary and Paula) put me into it. They said, "Too many people want to be forwards, so we're going to put you on defence." I didn't argue with it. I didn't know any better. I stuck with it and then never really had an urge to play forward.
What is your favourite (sport) outside of hockey? — Nik G.
Basketball for sure. I played a lot in high school, and I still try to play it now whenever I can. I was always a centre or a power forward. But if I took it to the next level, I don't think I could do either of those.
As part of a newer generation of NHL players, how much attention do you pay to advanced analytics (public or from within the club) to evaluate your impact or progression on the ice? — Johnny A.
I don't pay too much attention to it, really. I think there's analytics for everything out there. Honestly, I couldn't tell you what three-quarters of them mean. So, for me, I don't really pay too much attention to all that stuff.
You want to watch your shifts and see what you can improve on and what you did good.
Who is your least favourite opposing team and why is it Calgary? — Beau R.
Why is it Calgary? (Laughs.) Now playing in it, the Battle of Alberta has a different meaning to it. You see it on TV, but then playing in it, the games get chippy. Those are the games you love to play. They always make it fun and enjoyable, and it's always that much better getting a win off Calgary.
(Photo: Codie McLachlan / Getty Images)
Get all-access to exclusive stories.
Subscribe to The Athletic for in-depth coverage of your favorite players, teams, leagues and clubs. Try a week on us.
Daniel Nugent-Bowman is a staff writer who covers the Edmonton Oilers for The Athletic. Daniel has written about hockey for Sportsnet, The Hockey News, Yahoo Canada Sports and the Saskatoon StarPhoenix. Follow Daniel on Twitter @DNBsports | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 6,516 | [
128000,
38219,
58335,
7957,
6,
20413,
33586,
198,
2366,
18,
12873,
29664,
33407,
198,
40273,
22143,
2466,
4580,
198,
36,
16023,
426,
3102,
569,
33215,
1229,
36121,
25,
16543,
449,
423,
1923,
616,
49876,
11,
43468,
311,
279,
24603,
323,
279,
364,
33,
3102,
33909,
1270,
1383,
15469,
59345,
306,
7826,
363,
1543,
198,
2181,
596,
1193,
1403,
3953,
1139,
279,
3280,
11,
719,
45043,
426,
3102,
569,
374,
6288,
3339,
813,
9546,
6612,
389,
279,
90327,
6437,
1584,
627,
1548,
6476,
810,
1109,
220,
2137,
4520,
927,
279,
3388,
315,
279,
2128,
596,
1176,
1403,
46146,
11,
449,
810,
1109,
220,
605,
315,
1884,
4520,
5108,
559,
2419,
6601,
13,
8442,
423,
1923,
616,
49876,
706,
7543,
810,
892,
389,
279,
10054,
369,
279,
90327,
304,
430
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
38219,
58335,
7957,
6,
20413,
33586,
198,
2366,
18,
12873,
29664,
33407,
198,
40273,
22143,
2466,
4580,
198,
36,
16023,
426,
3102,
569,
33215,
1229,
36121,
25,
16543,
449,
423,
1923,
616,
49876,
11,
43468,
311,
279,
24603,
323,
279,
364,
33,
3102,
33909,
1270,
1383,
15469,
59345,
306,
7826,
363,
1543,
198,
2181,
596,
1193,
1403,
3953,
1139,
279,
3280,
11,
719,
45043,
426,
3102,
569,
374,
6288,
3339,
813,
9546,
6612,
389,
279,
90327,
6437,
1584,
627,
1548,
6476,
810,
1109,
220,
2137,
4520,
927,
279,
3388,
315,
279,
2128,
596,
1176,
1403,
46146,
11,
449,
810,
1109,
220,
605,
315,
1884,
4520,
5108,
559,
2419,
6601,
13,
8442,
423,
1923,
616,
49876,
706,
7543,
810,
892,
389,
279,
10054,
369,
279,
90327,
304,
430,
-100
] |
New Super Mario Bros. Wii is coming out in November.
New Super Mario Bros. Wii will be arriving in November.
Nintendo has confirmed that the game will be released on November 20 across Europe.
It will also launch in North America on November 15.
Based on the DS game of the same name, New Super Mario Bros. Wii allows up to four players to play simultaneously through 2D side-scrolling stages, with additional motion controlled abilities and new Mario suits.
The title was first announced at E3 earlier this year. | {
"redpajama_set_name": "RedPajamaC4"
} | 4,048 | [
128000,
3648,
7445,
24270,
34321,
13,
40292,
374,
5108,
704,
304,
6841,
627,
3648,
7445,
24270,
34321,
13,
40292,
690,
387,
33111,
304,
6841,
627,
87079,
706,
11007,
430,
279,
1847,
690,
387,
6004,
389,
6841,
220,
508,
4028,
4606,
627,
2181,
690,
1101,
7195,
304,
4892,
5270,
389,
6841,
220,
868,
627,
29815,
389,
279,
21223,
1847,
315,
279,
1890,
836,
11,
1561,
7445,
24270,
34321,
13,
40292,
6276,
709,
311,
3116,
4311,
311,
1514,
25291,
1555,
220,
17,
35,
3185,
35885,
287,
18094,
11,
449,
5217,
11633,
14400,
18000,
323,
502,
24270,
29076,
627,
791,
2316,
574,
1176,
7376,
520,
469,
18,
6931,
420,
1060,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
3648,
7445,
24270,
34321,
13,
40292,
374,
5108,
704,
304,
6841,
627,
3648,
7445,
24270,
34321,
13,
40292,
690,
387,
33111,
304,
6841,
627,
87079,
706,
11007,
430,
279,
1847,
690,
387,
6004,
389,
6841,
220,
508,
4028,
4606,
627,
2181,
690,
1101,
7195,
304,
4892,
5270,
389,
6841,
220,
868,
627,
29815,
389,
279,
21223,
1847,
315,
279,
1890,
836,
11,
1561,
7445,
24270,
34321,
13,
40292,
6276,
709,
311,
3116,
4311,
311,
1514,
25291,
1555,
220,
17,
35,
3185,
35885,
287,
18094,
11,
449,
5217,
11633,
14400,
18000,
323,
502,
24270,
29076,
627,
791,
2316,
574,
1176,
7376,
520,
469,
18,
6931,
420,
1060,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
University iowa creative writing summer program
November 15, 2019 Comments Off on University iowa creative writing summer program
Ask a Stoic, why all the Fixed Stars perform their daily revolutions in circles parallel to each other, though of very different diameters, and with velocities so proportioned that they all finish their period at the same time, and through the whole course of it preserve the same distance and situation with regard to one another? This qualification, however, is so important, quite apart from its necessity in connection with this plan, that we may consider it an advantage, rather than otherwise, that the plan puts it forward and insists upon it. It would be curious to hear what symbolism (if any) those who appeared so eager to get the hand-shake up to the level of the eyes assigned to this fashionable rite. They were thorough-bred workmen, and were not learning their art while they were exercising it. Where the laughing is not merely a trick played off by the bodily mechanism, but holds a germ of mind in the shape of a happy consciousness, it has its large and significant pauses. Here, again, I concede to Bain that the taking down of something a good peg-interval intensifies our satisfaction: but it seems impossible to maintain that our mirth depends altogether on the recognition of this. Its primitive meaning is, a sign, a mark, a characteristic. I wonder they allow the existence of the term _clair-obscur_ at all, but it is a word; and a word is a thing they can repeat and remember. Perhaps if we understood the physics of organic processes, we might speak here of an "interference," or, at least, of some antagonistic action between the motor-impulses of the laugh and of the sigh. When evidence is insufficient to support a charge, the accuser is made to take an oath as to the truth of his accusation, and the defendant is then required to chew a piece of _odum_ wood and drink a pitcher of water. The ideas represented by such phrases–catchwords, if you choose to call them so–as love, mother, home, liberty, church, the old flag; righteousness, civic duty–have had a power in setting energy free and accomplishing results, that is beyond estimation. We may easily conceive how, in the further progress of society, it might still grow more general in its signification, and come to signify, as at present, the approach of any thing whatever, whether it were good, bad, or indifferent. He will readily answer, that of _superiority_. ''Tis common.' There is nothing but the writhings and contortions of the heart, probed by affliction's point, as the flesh shrinks under the surgeon's knife. When it is remembered that in most American languages, and notably in the Mexican or Nahuatl, there is a tendency to consolidate each phrase into a single word, the importance of this consideration is greatly increased. Even upon such occasions, however, a well-disposed mind regards him with the most exquisite pity, and feels the highest indignation against those who affect to despise him for his weakness and imprudence. It knocks at our door, but we do not heed it because in this respect we have not begun yet to think nationally. G. Here, again, Massinger gives the general forensic statement, Shakespeare the particular image. A second or ritual system had thirteen weeks of twenty days each; but as thirteen times twenty makes only two hundred and sixty, in this computation there remained 105 days to be named and numbered. With Rostand the centre of gravity is in the expression of the emotion, not as with Maeterlinck in the emotion which cannot be expressed. Besides, the mechanical and high-finished style of art may be considered as something _done to order_. They were no doubt mostly communal structures. These languages must moreover be studied in the form in which they were spoken at the period of the conquest, and the course of native thought as expressed in the primitive grammatical structure must be understood and taken into account. I believe that this view is superficial and will not bear close analysis. He has been for years, for the most part, in a moping, poring, and solitary looking state; yet he has had occasional seasons of excitement, when the disposition towards furious revenge seemed to possess him, so much so, that he would, unprovoked, place his back against a corner of the wall in the attitude of self-defence, shaking his doubled fists in a daring and threatening manner. Dr. There seems to me to lurk in our laughter here something of the joy of the child, of the Naturkind, Walt Whitman, at the sight of what is customarily hidden away.[67] Leaving this, however, as a more doubtful case, let us turn to other groups. Today the library is a magazine of dynamic force and the librarian is the man who exerts and directs it–who persuades the community that it needs books and then satisfies that need, instead of waiting for the self-realization which too often will never come. No doubt you will be aware of a definite movement of thought in the required direction and of the dissolution into nothing of the expectant idea. Severity of manners, and regularity of conduct, on the other hand, were altogether unfashionable, and were connected, in the imagination of that age, with cant, cunning, hypocrisy, and low manners. {211} In this case, it is evident, we have to do with a greeting of the laughable which will vary greatly according to the psycho-physical condition of the child. Though other people abuse them, they can still praise themselves! The reward which Nature bestows upon good behaviour under misfortune, is thus exactly proportioned to the degree of that good behaviour. The production of the sounds by the spasmodic expiratory movements shows that the passage from the trachea into the pharynx, _viz._, the glottis or chink between the vocal cords, is partially closed. On the 141st day, too, when held in her nurse's arms, she {206} smiled at her grandfather and others and then ducked her head. The sea is spread out into a calm, or heaved into a storm, according to the good pleasure of Neptune. It is not specially alluded to in any body of laws, but numerous examples of it have been incidentally given above, and in some of the _ordines_ it is assumed as a matter of course. But _nefer_ had several other significations in Coptic. So it is with rules of conduct. You only by that give me a mean opinion of your ideas of utility. The humorist, as we have viewed him, is able through the development of his individuality to detach himself from many of the common judgments and much of the common laughter of the particular community of which he is a member. The poet describes vividly and individually, so that any general results from what he writes must be from the aggregate of well-founded particulars: to embody an abstract theory, as if it were a given part of actual nature, is an impertinence and indecorum. Unfortunately, when a community needs a given class of books very desperately it is often serenely unconscious of the fact. It should be the function of the supreme lay authority to decide what results it wants and then to see that it gets them–to call attention to any deviation from them and to replace those who cannot achieve them by others who can. The meaning of which is, that we are not to give too implicit or unqualified an assent to the principle, at which modern philosophers have arrived with some pains and difficulty, that we acquire our ideas of external objects through the senses. We laugh at him because there is still plenty of room and means of utilizing it unknown in his time. A missal of each kind was committed to the flames, and, to the great joy of all patriotic Castilians, the Gothic offices were unconsumed.[984] More satisfactory to the orthodox was the result of a similar ordeal during the efforts of St. I.–_That whatever appears to be the proper Object of Gratitude, appears to deserve Reward; and university iowa creative writing summer program that, in the same Manner, whatever appears to be the proper Object of Resentment, appears to deserve Punishment._ TO us, therefore, that action must appear to deserve reward, which appears to be the proper and approved object of that sentiment, which most immediately and directly prompts us to reward, or to do good to another. Burgher life, moreover, was precociously developed in the social and political organization, and as the imperial influence diminished with the fall of the House of Hohenstaufen, the cities assumed self-government and fashioned their local legislation after their own ideals. 13. The ground we tread on is as old as the university iowa creative writing summer program creation, though it does not seem so, except when collected into gigantic masses, or separated by gloomy solitudes from modern uses and the purposes of common life.
Writing creative summer iowa university program. I do not believe the first, certainly. The simple wants of the child are never exactly the same in themselves, the accidental circumstances with which they are combined are necessarily varying every moment, nor are the sentiments and temper of the father less liable to constant and imperceptible fluctuations. Nothing satisfies or gives them pleasure that does not give others pain: they scorn to win you by flattery and fair words; they set up their grim, bare idols, and expect you to fall down and worship them; and truth is with them a Sphinx, that in embracing pierces you to the heart. _Elegance_ is a word that means something different from ease, grace, beauty, dignity; yet it is akin to all these; but it seems more particularly to imply a sparkling brilliancy of effect with finish and precision. There were altogether about half a dozen of these, with staffs varying in number perhaps from five to forty or fifty persons. But why do we make this difference, since, if there is no fault in the one, neither is there any merit in the other? When one set gets used to the distinctive ways of another, it tends to regard them as right and proper for the latter; and it may carry its regard for their propriety so far as to support the inner sentiment of the other group by deriding those members who do not conform to their group-customs. Thus, though we see that man compares his sensations and ideas, inquires into the causes of phenomena, draws consequences and discovers laws and general principles; that he measures distances and times, and crosses the sea from one end to another; that he acknowledges culpability and worthiness; that he bears a monitor in his own breast, and raises his mind to the idea and adoration of God:—yet all these faculties result neither from accidental influence from without, nor from his own will. The French (taken all together) are a more sensible, reflecting, and better informed people than the English. when the latter was deposed at the Council of Lyons in 1245 was that he had forced ecclesiastics to undergo the duel, to the confusion of all distinctions between clerk and layman.[490] Even in Italy about 1220 the podesta of Florence ordered the duel to decide a suit concerning certain property between some citizens and the church of the Apostles; the latter invoked the intervention of Honorius III., who commanded the matter to be settled by regular judicial process, boldly alleging that the duel was unheard of in such matters,[491] but in spite of this and the repeated prohibitions of the popes, trial by combat was still towards the close of the thirteenth century regarded as the only mode of settling disputed questions between churches when the genuineness of a charter was impugned.[492] Yet at the same period the doctors of canon law held that an ecclesiastic appearing in the lists, either personally or by a champion, was subject to deposition; it was better, they said, to lose lands and fiefs than to incur mortal sin. Laughter, looked at from this point of view, has its significance as a function of the human organism, and as spreading its benefits over all the paths of life. Do they not wish to extend 'the greatest happiness to the greatest numbers,' by putting a stop to population—to relieve distress by withholding charity, to remedy disease by shutting up hospitals? Every human being is distinguished from every other human being, both numerically, and characteristically. A premature and superficial sensibility is the grave of French genius and of French taste. No man can get above his pursuit in life: it is getting above himself, which is impossible. The most recondite formul? We say that this is unfortunate because emotion never brings us nearer the truth. To say that a thing is laughable, just as to say that a thing is eatable, implies an element of permanence and of universality. His labours, however, seem rather to have increased than to have diminished the causes of that dissatisfaction, which the learned soon began to feel with the system of Ptolemy. These, they observed, upon account of their immense distance, must necessarily appear to revolve in circles concentric with the globe of the Earth, and with one another: but that we cannot, therefore, be certain that they really revolve in such circles, since, though they did not, they would still have the same appearance. This is the secret of monarchy.—Loyalty is not the love of kings, but hatred and jealousy of mankind. The general rules which determine what actions are, and what are not, the objects of each of those sentiments, can be formed no other way than by observing what actions actually and in fact excite them. How does it signify to me what I shall hereafter feel, or how can it influence my present conduct, or how ought it to do so but because, and in as far as, I have some idea of it beforehand?[73] The injury that I may do to my future interest will not certainly by any kind of reaction return to punish me for my neglect of my own happiness. In fact, so important have I considered this plan of Classification, that when I first came to Leopard's Hill Lodge, I contrived the best way I could, with my means, to have a family and front part of the house, independent of the galleries; and should I be called upon to extend my plan to meet my increasing success, and should my life be spared, and university iowa creative writing summer program time and health permit me to follow out my views and to build an Asylum upon a larger scale, I should keep these principles of Classification, as well as many others, in view, in the plan I should adopt, for I am more and more confirmed that they are extremely important; and I may mention as proofs, that at all the houses we have had parties in the front part, who would, in their conduct and pursuits, and social enjoyments, put to shame many families who are reckoned perfectly sane. Because it is this, and only this, it will never make a Shakespeare or a Newton out of one who has it not "in him," as the idiom so well runs, to become one or the other. The craniologist may make fools of his disciples at pleasure, unless he is an honest man. Privity to homicide, for instance, was divided into three triads, or nine classes of various degrees of guilt. We have all seen both these things happen, not only in libraries, but in banks, in hospitals, in charitable institutions. One other illustration of the _role_ of the playful spirit in the sphere of the laughable must not be overlooked. The sympathetic tears which we shed for that immense and irretrievable loss, which in our fancy he appears to have sustained, seem to be but a small part of the duty which we owe him. To know the best in each class infers a higher degree of taste; to reject the class is only a negation of taste; for different classes do not interfere with one another, nor can any one's _ipse dixit_ be taken on so wide a question as abstract excellence. The author of this fabrication had not taken the simplest precaution to make his statements coincide with facts. Mutilation is even harder to detect. ESSAY XXXII ON THE JEALOUSY AND THE SPLEEN OF PARTY university iowa creative writing summer program 'It is michin-malico, and means mischief.'—HAMLET.
Previous Post:Pay to do custom academic essay on presidential elections
Next Post:Synthesis of formyl | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 4,081 | [
128000,
31272,
602,
13780,
11782,
4477,
7474,
2068,
198,
34827,
220,
868,
11,
220,
679,
24,
18149,
4206,
389,
3907,
602,
13780,
11782,
4477,
7474,
2068,
198,
27264,
264,
71883,
292,
11,
3249,
682,
279,
20755,
25676,
2804,
872,
7446,
93574,
304,
26432,
15638,
311,
1855,
1023,
11,
3582,
315,
1633,
2204,
13047,
2481,
11,
323,
449,
75157,
779,
21801,
291,
430,
814,
682,
6381,
872,
4261,
520,
279,
1890,
892,
11,
323,
1555,
279,
4459,
3388,
315,
433,
21813,
279,
1890,
6138,
323,
6671,
449,
5363,
311,
832,
2500,
30,
1115,
46160,
11,
4869,
11,
374,
779,
3062,
11,
5115,
10980,
505,
1202,
32961,
304,
3717,
449,
420,
3197,
11,
430,
584,
1253,
2980,
433,
459,
9610,
11,
4856,
1109,
6062,
11,
430,
279,
3197,
9711,
433
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
31272,
602,
13780,
11782,
4477,
7474,
2068,
198,
34827,
220,
868,
11,
220,
679,
24,
18149,
4206,
389,
3907,
602,
13780,
11782,
4477,
7474,
2068,
198,
27264,
264,
71883,
292,
11,
3249,
682,
279,
20755,
25676,
2804,
872,
7446,
93574,
304,
26432,
15638,
311,
1855,
1023,
11,
3582,
315,
1633,
2204,
13047,
2481,
11,
323,
449,
75157,
779,
21801,
291,
430,
814,
682,
6381,
872,
4261,
520,
279,
1890,
892,
11,
323,
1555,
279,
4459,
3388,
315,
433,
21813,
279,
1890,
6138,
323,
6671,
449,
5363,
311,
832,
2500,
30,
1115,
46160,
11,
4869,
11,
374,
779,
3062,
11,
5115,
10980,
505,
1202,
32961,
304,
3717,
449,
420,
3197,
11,
430,
584,
1253,
2980,
433,
459,
9610,
11,
4856,
1109,
6062,
11,
430,
279,
3197,
9711,
433,
-100
] |
Αρχική › Επιστημονικά ελληνόγλωσσα › Αρθρα › The REAL Reason America Used Nuclear Weapons Against Japan (It Was Not To End the War Or Save Lives)
The REAL Reason America Used Nuclear Weapons Against Japan (It Was Not To End the War Or Save Lives)
Εισαγωγή. το άρθρο που ακολουθεί είναι από πολλές πλευρές σημαντικό γιατί τεκμηριώνει το γεγονός ότι η χρήση των δύο (και μέχρι στιγμής τελευταίων) πυρηνικών βομβών δεν ήταν μια
Rawls John, Το δίκαιο των λαών
αναγκαία πράξη που θα υπηρετούσε κάποιο πολιτικό σκοπό. Επίσης, ότι ήταν ένα έγκλημα πολέμου. Το ζήτημα της χρήσης των πυρηνικών όπλων είναι ένα από τα κρισιμότερα της σύγχρονης εποχής και κυρίως του μέλλοντος, ιδιαίτερα ενόσω δεν ελέγχεται η διασπορά τους και οι «έχοντες» δεν περιορίζουν επαρκώς ή δεν προχωρούν στον πυρηνικό αφοπλισμό όπως αρχικά υποσχέθηκαν στην Συνθήκη μη Διασποράς των πυρηνικών όπλων. Υπάρχουν εδώ αρκετά άρθρα για αυτά τα ζητήματα. Σε ένα βιβλίο των Εκδόσεων Ποιότητα, του John Rawls, «Το δίκαιο των λαών», ένα από τα σημαντικότερα έργα πολιτικής φιλοσοφίας των διεθνών σχέσεων, ο διακεκριμένος Αμερικανός φιλόσοφος δεν αφήνει περιθώρια παρερμηνείας για την χρήση πυρηνικών όπλων την δεκαετία του 1940 από τους Αμερικανούς, στο σημείο μάλιστα όπου περιγράφει και ερμηνεύει τα «εκτός νόμου κράτη». Αφού αναλύσει εξαντλητικά και σε αναφορά με περιπτώσεις συμπεραίνει ότι οι πυρηνικές βόμβες με τις οποίες βομβαρδίστηκαν το Ναγκασάκι και η Χιροσίμα και για τον βομβαρδισμό της Δρέσδης (βλ. ιδ. σ. 171, 179-80, 182, 188) ήταν, βασικά, μια πράξη που συνιστά έγκλημα πολέμου. Όπως εξηγεί το άρθρο που αναρτάται, όχι μόνο σκοτώθηκαν μαζικά άμαχοι, αλλά επιπλέον δεν εξυπηρετούσε κάποιο πολιτικό σκοπό καθότι οι Ιάπωνες θα παραδίδονταν.
Atomic Weapons Were Not Needed to End the War or Save Lives
Like all Americans, I was taught that the U.S. dropped nuclear bombs on Hiroshima and Nagasaki in order to end WWII and save both American and Japanese lives.
But most of the top American military officials at the time said otherwise.
The U.S. Strategic Bombing Survey group, assigned by President Truman to study the air attacks on Japan, produced a report in July of 1946 that concluded (52-56):
Based on a detailed investigation of all the facts and supported by the testimony of the surviving Japanese leaders involved, it is the Survey's opinion that certainly prior to 31 December 1945 and in all probability prior to 1 November 1945, Japan would have surrendered even if the atomic bombs had not been dropped, even if Russia had not entered the war, and even if no invasion had been planned or contemplated.
General (and later president) Dwight Eisenhower – then Supreme Commander of all Allied Forces, and the officer who created most of America's WWII military plans for Europe and Japan – said:
The Japanese were ready to surrender and it wasn't necessary to hit them with that awful thing.
Newsweek, 11/11/63, Ike on Ike
Eisenhower also noted (pg. 380):
In [July] 1945… Secretary of War Stimson, visiting my headquarters in Germany, informed me that our government was preparing to drop an atomic bomb on Japan. I was one of those who felt that there were a number of cogent reasons to question the wisdom of such an act. …the Secretary, upon giving me the news of the successful bomb test in New Mexico, and of the plan for using it, asked for my reaction, apparently expecting a vigorous assent.
During his recitation of the relevant facts, I had been conscious of a feeling of depression and so I voiced to him my grave misgivings, first on the basis of my belief that Japan was already defeated and that dropping the bomb was completely unnecessary, and secondly because I thought that our country should avoid shocking world opinion by the use of a weapon whose employment was, I thought, no longer mandatory as a measure to save American lives. It was my belief that Japan was, at that very moment, seeking some way to surrender with a minimum loss of 'face'. The Secretary was deeply perturbed by my attitude….
Admiral William Leahy – the highest ranking member of the U.S. military from 1942 until retiring in 1949, who was the first de facto Chairman of the Joint Chiefs of Staff, and who was at the center of all major American military decisions in World War II – wrote (pg. 441):
It is my opinion that the use of this barbarous weapon at Hiroshima and Nagasaki was of no material assistance in our war against Japan. The Japanese were already defeated and ready to surrender because of the effective sea blockade and the successful bombing with conventional weapons.
The lethal possibilities of atomic warfare in the future are frightening. My own feeling was that in being the first to use it, we had adopted an ethical standard common to the barbarians of the Dark Ages. I was not taught to make war in that fashion, and wars cannot be won by destroying women and children.
General Douglas MacArthur agreed (pg. 65, 70-71):
MacArthur's views about the decision to drop the atomic bomb on Hiroshima and Nagasaki were starkly different from what the general public supposed …. When I asked General MacArthur about the decision to drop the bomb, I was surprised to learn he had not even been consulted. What, I asked, would his advice have been? He replied that he saw no military justification for the dropping of the bomb. The war might have ended weeks earlier, he said, if the United States had agreed, as it later did anyway, to the retention of the institution of the emperor.
Moreover (pg. 512):
The Potsdam declaration in July, demand[ed] that Japan surrender unconditionally or face 'prompt and utter destruction.' MacArthur was appalled. He knew that the Japanese would never renounce their emperor, and that without him an orderly transition to peace would be impossible anyhow, because his people would never submit to Allied occupation unless he ordered it. Ironically, when the surrender did come, it was conditional, and the condition was a continuation of the imperial reign. Had the General's advice been followed, the resort to atomic weapons at Hiroshima and Nagasaki might have been unnecessary.
Similarly, Assistant Secretary of War John McLoy noted (pg. 500):
I have always felt that if, in our ultimatum to the Japanese government issued from Potsdam [in July 1945], we had referred to the retention of the emperor as a constitutional monarch and had made some reference to the reasonable accessibility of raw materials to the future Japanese government, it would have been accepted. Indeed, I believe that even in the form it was delivered, there was some disposition on the part of the Japanese to give it favorable consideration. When the war was over I arrived at this conclusion after talking with a number of Japanese officials who had been closely associated with the decision of the then Japanese government, to reject the ultimatum, as it was presented. I believe we missed the opportunity of effecting a Japanese surrender, completely satisfactory to us, without the necessity of dropping the bombs.
Under Secretary of the Navy Ralph Bird said:
I think that the Japanese were ready for peace, and they already had approached the Russians and, I think, the Swiss. And that suggestion of [giving] a warning [of the atomic bomb] was a face-saving proposition for them, and one that they could have readily accepted.
In my opinion, the Japanese war was really won before we ever used the atom bomb. Thus, it wouldn't have been necessary for us to disclose our nuclear position and stimulate the Russians to develop the same thing much more rapidly than they would have if we had not dropped the bomb.
War Was Really Won Before We Used A-Bomb, U.S. News and World Report, 8/15/60, pg. 73-75.
He also noted (pg. 144-145, 324):
It definitely seemed to me that the Japanese were becoming weaker and weaker. They were surrounded by the Navy. They couldn't get any imports and they couldn't export anything. Naturally, as time went on and the war developed in our favor it was quite logical to hope and expect that with the proper kind of a warning the Japanese would then be in a position to make peace, which would have made it unnecessary for us to drop the bomb and have had to bring Russia in.
Alfred McCormack – Director of Military Intelligence for the Pacific Theater of War, who was probably in as good position as anyone for judging the situation – believed that the Japanese surrender could have been obtained in a few weeks by blockade alone:
The Japanese had no longer enough food in stock, and their fuel reserves were practically exhausted. We had begun a secret process of mining all their harbors, which was steadily isolating them from the rest of the world. If we had brought this project to its logical conclusion, the destruction of Japan's cities with incendiary and other bombs would have been quite unnecessary.
General Curtis LeMay, the tough cigar-smoking Army Air Force "hawk," stated publicly shortly before the nuclear bombs were dropped on Japan:
The war would have been over in two weeks. . . . The atomic bomb had nothing to do with the end of the war at all.
The Vice Chairman of the U.S. Bombing Survey Paul Nitze wrote (pg. 36-37, 44-45):
[I] concluded that even without the atomic bomb, Japan was likely to surrender in a matter of months. My own view was that Japan would capitulate by November 1945.
Even without the attacks on Hiroshima and Nagasaki, it seemed highly unlikely, given what we found to have been the mood of the Japanese government, that a U.S. invasion of the islands [scheduled for November 1, 1945] would have been necessary.
Deputy Director of the Office of Naval Intelligence Ellis Zacharias wrote:
Just when the Japanese were ready to capitulate, we went ahead and introduced to the world the most devastating weapon it had ever seen and, in effect, gave the go-ahead to Russia to swarm over Eastern Asia.
Washington decided that Japan had been given its chance and now it was time to use the A-bomb.
I submit that it was the wrong decision. It was wrong on strategic grounds. And it was wrong on humanitarian grounds.
Ellis Zacharias, How We Bungled the Japanese Surrender, Look, 6/6/50, pg. 19-21.
Brigadier General Carter Clarke – the military intelligence officer in charge of preparing summaries of intercepted Japanese cables for President Truman and his advisors – said (pg. 359):
When we didn't need to do it, and we knew we didn't need to do it, and they knew that we knew we didn't need to do it, we used them as an experiment for two atomic bombs.
Many other high-level military officers concurred. For example:
The commander in chief of the U.S. Fleet and Chief of Naval Operations, Ernest J. King, stated that the naval blockade and prior bombing of Japan in March of 1945, had rendered the Japanese helpless and that the use of the atomic bomb was both unnecessary and immoral. Also, the opinion of Fleet Admiral Chester W. Nimitz was reported to have said in a press conference on September 22, 1945, that "The Admiral took the opportunity of adding his voice to those insisting that Japan had been defeated before the atomic bombing and Russia's entry into the war." In a subsequent speech at the Washington Monument on October 5, 1945, Admiral Nimitz stated "The Japanese had, in fact, already sued for peace before the atomic age was announced to the world with the destruction of Hiroshima and before the Russian entry into the war." It was learned also that on or about July 20, 1945, General Eisenhower had urged Truman, in a personal visit, not to use the atomic bomb. Eisenhower's assessment was "It wasn't necessary to hit them with that awful thing . . . to use the atomic bomb, to kill and terrorize civilians, without even attempting [negotiations], was a double crime." Eisenhower also stated that it wasn't necessary for Truman to "succumb" to [the tiny handful of people putting pressure on the president to drop atom bombs on Japan.]
British officers were of the same mind. For example, General Sir Hastings Ismay, Chief of Staff to the British Minister of Defence, said to Prime Minister Churchill that "when Russia came into the war against Japan, the Japanese would probably wish to get out on almost any terms short of the dethronement of the Emperor."
On hearing that the atomic test was successful, Ismay's private reaction was one of "revulsion."
Why Were Bombs Dropped on Populated Cities Without Military Value?
Even military officers who favored use of nuclear weapons mainly favored using them on unpopulated areas or Japanese military targets … not cities.
For example, Special Assistant to the Secretary of the Navy Lewis Strauss proposed to Secretary of the Navy James Forrestal that a non-lethal demonstration of atomic weapons would be enough to convince the Japanese to surrender … and the Navy Secretary agreed (pg. 145, 325):
I proposed to Secretary Forrestal that the weapon should be demonstrated before it was used. Primarily it was because it was clear to a number of people, myself among them, that the war was very nearly over. The Japanese were nearly ready to capitulate… My proposal to the Secretary was that the weapon should be demonstrated over some area accessible to Japanese observers and where its effects would be dramatic. I remember suggesting that a satisfactory place for such a demonstration would be a large forest of cryptomeria trees not far from Tokyo. The cryptomeria tree is the Japanese version of our redwood… I anticipated that a bomb detonated at a suitable height above such a forest… would lay the trees out in windrows from the center of the explosion in all directions as though they were matchsticks, and, of course, set them afire in the center. It seemed to me that a demonstration of this sort would prove to the Japanese that we could destroy any of their cities at will… Secretary Forrestal agreed wholeheartedly with the recommendation…
It seemed to me that such a weapon was not necessary to bring the war to a successful conclusion, that once used it would find its way into the armaments of the world…
General George Marshall agreed:
Contemporary documents show that Marshall felt "these weapons might first be used against straight military objectives such as a large naval installation and then if no complete result was derived from the effect of that, he thought we ought to designate a number of large manufacturing areas from which the people would be warned to leave–telling the Japanese that we intend to destroy such centers…."
As the document concerning Marshall's views suggests, the question of whether the use of the atomic bomb was justified turns … on whether the bombs had to be used against a largely civilian target rather than a strictly military target—which, in fact, was the explicit choice since although there were Japanese troops in the cities, neither Hiroshima nor Nagasaki was deemed militarily vital by U.S. planners. (This is one of the reasons neither had been heavily bombed up to this point in the war.) Moreover, targeting [at Hiroshima and Nagasaki] was aimed explicitly on non-military facilities surrounded by workers' homes.
Historians Agree that the Bomb Wasn't Needed
Historians agree that nuclear weapons did not need to be used to stop the war or save lives.
As historian Doug Long notes:
U.S. Nuclear Regulatory Commission historian J. Samuel Walker has studied the history of research on the decision to use nuclear weapons on Japan. In his conclusion he writes, "The consensus among scholars is that the bomb was not needed to avoid an invasion of Japan and to end the war within a relatively short time. It is clear that alternatives to the bomb existed and that Truman and his advisors knew it." (J. Samuel Walker, The Decision to Use the Bomb: A Historiographical Update, Diplomatic History, Winter 1990, pg. 110).
Politicians Agreed
Many high-level politicians agreed. For example, Herbert Hoover said (pg. 142):
The Japanese were prepared to negotiate all the way from February 1945…up to and before the time the atomic bombs were dropped; …if such leads had been followed up,there would have been no occasion to drop the [atomic] bombs.
Under Secretary of State Joseph Grew noted (pg. 29-32):
In the light of available evidence I myself and others felt that if such a categorical statement about the [retention of the] dynasty had been issued in May, 1945, the surrender-minded elements in the [Japanese] Government might well have been afforded by such a statement a valid reason and the necessary strength to come to an early clearcut decision.
If surrender could have been brought about in May, 1945, or even in June or July, before the entrance of Soviet Russia into the [Pacific] war and the use of the atomic bomb, the world would have been the gainer.
Why Then Were Atom Bombs Dropped on Japan?
If dropping nuclear bombs was unnecessary to end the war or to save lives, why was the decision to drop them made? Especially over the objections of so many top military and political figures?
One theory is that scientists like to play with their toys:
On September 9, 1945, Admiral William F. Halsey, commander of the Third Fleet, was publicly quoted extensively as stating that the atomic bomb was used because the scientists had a "toy and they wanted to try it out . . . ." He further stated, "The first atomic bomb was an unnecessary experiment . . . . It was a mistake to ever drop it."
However, most of the Manhattan Project scientists who developed the atom bomb were opposed to using it on Japan.
Albert Einstein – an important catalyst for the development of the atom bomb (but not directly connected with the Manhattan Project) – said differently:
"A great majority of scientists were opposed to the sudden employment of the atom bomb." In Einstein's judgment, the dropping of the bomb was a political – diplomatic decision rather than a military or scientific decision.
Indeed, some of the Manhattan Project scientists wrote directly to the secretary of defense in 1945 to try to dissuade him from dropping the bomb:
We believe that these considerations make the use of nuclear bombs for an early, unannounced attack against Japan inadvisable. If the United States would be the first to release this new means of indiscriminate destruction upon mankind, she would sacrifice public support throughout the world, precipitate the race of armaments, and prejudice the possibility of reaching an international agreement on the future control of such weapons.
Political and Social Problems, Manhattan Engineer District Records, Harrison-Bundy files, folder # 76, National Archives (also contained in: Martin Sherwin, A World Destroyed, 1987 edition, pg. 323-333).
The scientists questioned the ability of destroying Japanese cities with atomic bombs to bring surrender when destroying Japanese cities with conventional bombs had not done so, and – like some of the military officers quoted above – recommended a demonstration of the atomic bomb for Japan in an unpopulated area.
The Real Explanation?
History.com notes:
In the years since the two atomic bombs were dropped on Japan, a number of historians have suggested that the weapons had a two-pronged objective …. It has been suggested that the second objective was to demonstrate the new weapon of mass destruction to the Soviet Union. By August 1945, relations between the Soviet Union and the United States had deteriorated badly. The Potsdam Conference between U.S. President Harry S. Truman, Russian leader Joseph Stalin, and Winston Churchill (before being replaced by Clement Attlee) ended just four days before the bombing of Hiroshima. The meeting was marked by recriminations and suspicion between the Americans and Soviets. Russian armies were occupying most of Eastern Europe.Truman and many of his advisers hoped that the U.S. atomic monopoly might offer diplomatic leverage with the Soviets. In this fashion, the dropping of the atomic bomb on Japan can be seen as the first shot of the Cold War.
New Scientist reported in 2005:
The US decision to drop atomic bombs on Hiroshima and Nagasaki in 1945 was meant to kick-start the Cold War rather than end the Second World War, according to two nuclear historians who say they have new evidence backing the controversial theory.
Causing a fission reaction in several kilograms of uranium and plutonium and killing over 200,000 people 60 years ago was done more to impress the Soviet Union than to cow Japan, they say. And the US President who took the decision, Harry Truman, was culpable, they add.
"He knew he was beginning the process of annihilation of the species," says Peter Kuznick, director of the Nuclear Studies Institute at American University in Washington DC, US. "It was not just a war crime; it was a crime against humanity."
[The conventional explanation of using the bombs to end the war and save lives] is disputed by Kuznick and Mark Selden, a historian from Cornell University in Ithaca, New York, US.
New studies of the US, Japanese and Soviet diplomatic archives suggest thatTruman's main motive was to limit Soviet expansion in Asia, Kuznick claims. Japan surrendered because the Soviet Union began an invasion a few days after the Hiroshima bombing, not because of the atomic bombs themselves, he says.
According to an account by Walter Brown, assistant to then-US secretary of state James Byrnes, Truman agreed at a meeting three days before the bomb was dropped on Hiroshima that Japan was "looking for peace". Truman was told by his army generals, Douglas Macarthur and Dwight Eisenhower, and his naval chief of staff, William Leahy, that there was no military need to use the bomb.
"Impressing Russia was more important than ending the war in Japan," says Selden.
John Pilger points out:
The US secretary of war, Henry Stimson, told President Truman he was "fearful" that the US air force would have Japan so "bombed out" that the new weapon would not be able "to show its strength". He later admitted that "no effort was made, and none was seriously considered, to achieve surrender merely in order not to have to use the bomb". His foreign policy colleagues were eager "to browbeat the Russians with the bomb held rather ostentatiously on our hip". General Leslie Groves, director of the Manhattan Project that made the bomb, testified: "There was never any illusion on my part that Russia was our enemy, and that the project was conducted on that basis." The day after Hiroshima was obliterated, President Truman voiced his satisfaction with the "overwhelming success" of "the experiment".
We'll give the last word to University of Maryland professor of political economy – and former Legislative Director in the U.S. House of Representatives and the U.S. Senate, and Special Assistant in the Department of State – Gar Alperovitz:
Though most Americans are unaware of the fact, increasing numbers of historians now recognize the United States did not need to use the atomic bomb to end the war against Japan in 1945. Moreover, this essential judgment was expressed by the vast majority of top American military leaders in all three services in the years after the war ended: Army, Navy and Army Air Force. Nor was this the judgment of "liberals," as is sometimes thought today. In fact, leading conservatives were far more outspoken in challenging the decision as unjustified and immoral than American liberals in the years following World War II.
Instead [of allowing other options to end the war, such as letting the Soviets attack Japan with ground forces], the United States rushed to use two atomic bombs at almost exactly the time that an August 8 Soviet attack had originally been scheduled: Hiroshima on August 6 and Nagasaki on August 9. The timing itself has obviously raised questions among many historians. The available evidence, though not conclusive, strongly suggests that the atomic bombs may well have been used in part because American leaders "preferred"—as Pulitzer Prize–winning historian Martin Sherwin has put it—to end the war with the bombs rather than the Soviet attack. Impressing the Soviets during the early diplomatic sparring that ultimately became the Cold War also appears likely to have been a significant factor.
The most illuminating perspective, however, comes from top World War II American military leaders. The conventional wisdom that the atomic bomb saved a million lives is so widespread that … most Americans haven't paused to ponder something rather striking to anyone seriously concerned with the issue: Not only did most top U.S. military leaders think the bombings were unnecessary and unjustified, many were morally offended by what they regarded as the unnecessary destruction of Japanese cities and what were essentially noncombat populations. Moreover, they spoke about it quite openly and publicly.
Shortly before his death General George C. Marshall quietly defended the decision, but for the most part he is on record as repeatedly saying that it was not a military decision, but rather a political one.
‹ Στην περίπτωση της Ελλάδας το ΔΝΤ αγνόησε όλα τα διδάγματα που είχαν εξαχθεί επί δεκαετίες
Θεόδωρος Καρυώτης, Ελλάδα: Η τραγωδία της ανάπτυξης ›
Κατηγορίες:Αρθρα, Διάστημα, Διεθνή, Διεθνείς σχέσεις, Διεθνείς Σχέσεις, ΗΠΑ, Στρατηγική
Ετικέτες: πυρηνικά όπλα, πόλεμος, πολιτική, ΗΠΑ, Ναγκασάκι, Χιροσίμα, Rawls | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 2,388 | [
128000,
100341,
102659,
101857,
46733,
105821,
123427,
114106,
102434,
123280,
106094,
111479,
111790,
46733,
100423,
110791,
100379,
46733,
578,
26339,
27857,
5270,
12477,
38544,
47664,
30241,
6457,
320,
2181,
15148,
2876,
2057,
4060,
279,
5111,
2582,
10467,
40495,
340,
791,
26339,
27857,
5270,
12477,
38544,
47664,
30241,
6457,
320,
2181,
15148,
2876,
2057,
4060,
279,
5111,
2582,
10467,
40495,
340,
100477,
100831,
19481,
121565,
13,
100464,
101865,
127839,
101320,
109737,
101172,
73986,
106396,
102072,
100919,
105385,
100861,
101040,
52845,
106043,
39179,
101040,
127683,
104464,
101046,
104479,
106519,
68437,
102846,
100440,
100704,
100363,
100464,
126024,
125403,
100998,
105420,
101034,
126793,
101686,
113697,
320,
119311,
118907,
126948,
60474,
44223,
100895,
115035,
110131,
8,
52845,
54556,
101906,
34369,
106755,
122297,
102920,
100704,
104054,
105190,
104557,
198,
20613,
4835,
3842,
11,
104545
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
100341,
102659,
101857,
46733,
105821,
123427,
114106,
102434,
123280,
106094,
111479,
111790,
46733,
100423,
110791,
100379,
46733,
578,
26339,
27857,
5270,
12477,
38544,
47664,
30241,
6457,
320,
2181,
15148,
2876,
2057,
4060,
279,
5111,
2582,
10467,
40495,
340,
791,
26339,
27857,
5270,
12477,
38544,
47664,
30241,
6457,
320,
2181,
15148,
2876,
2057,
4060,
279,
5111,
2582,
10467,
40495,
340,
100477,
100831,
19481,
121565,
13,
100464,
101865,
127839,
101320,
109737,
101172,
73986,
106396,
102072,
100919,
105385,
100861,
101040,
52845,
106043,
39179,
101040,
127683,
104464,
101046,
104479,
106519,
68437,
102846,
100440,
100704,
100363,
100464,
126024,
125403,
100998,
105420,
101034,
126793,
101686,
113697,
320,
119311,
118907,
126948,
60474,
44223,
100895,
115035,
110131,
8,
52845,
54556,
101906,
34369,
106755,
122297,
102920,
100704,
104054,
105190,
104557,
198,
20613,
4835,
3842,
11,
104545,
-100
] |
Welcome to the thirty-seventh episode of the Tea in the Treetops podcast hosted by Philippa and Angelya.
In this episode, we get excited about lots of books being published during 2016 – mostly YA Sci-fi and Fantasy but with a few extras. This episode was recorded on January 17th, 2016.
George RR Martin's apology about not quite finishing The Winds of Winter yet.
Yes, Ang took her 4-year-old to see Star Wars: The Force Awakens. He loved it!
Thanks to Novelty podcast for recommending Fangirl!
I was a bit confused about something mentioned during this episode, maybe you can set my brain straight. I thought I heard one of you reference the fact that you had read 'Lady Helen' but then it came up that you were both really excited to read 'Dark Days Club' when it comes out.
From what Goodreads has told me, 'Lady Helen and the Dark Days Club' is the original title and what looks like the title for the Aussie version but in other areas it is just titled 'The Dark Days Club' and publishes in a week or so. Is this the same book and I just heard you wrong or am I broken and don't understand simple concepts?
P.S. It was mentioned that 'Morning Star' (Book #3 of Pierce Brown's Red Rising series) comes out in early February. I literally have a countdown on my calendar for this because I'm losing my mind in anticipation of this book being available to devour. I know it is always just more stuff to the "I've heard that is great, I should really get around to it" epic list that keeps growing but seriously. These. Books. From knowing what you both enjoy I truly think you will love these books but I need you to read them so that if you DO love them, then I have people to geek out over them with. 🙂 Because naturally, it is all about me.
Yes, you've got it right, 'Lady Helen and the Dark Days Club' is just called 'The Dark Days Club' in other countries. It's already out in Australia, but the Jan release date is for overseas. I have already read it, yes, and it's awesome, and hopefully everyone else will get to read it soon too.
No worries and thank you for the clarification. Sometimes when books have both different publication dates and different but similar titles in different parts of the world, it creates overload in my brain.
Heaven forbid that I miss out on a potential extra item to add to my 'must read' pile. The horror would be unspeakable! | {
"redpajama_set_name": "RedPajamaC4"
} | 2,968 | [
128000,
14262,
311,
279,
27219,
7962,
45707,
9417,
315,
279,
31125,
304,
279,
350,
3829,
3806,
18181,
21685,
555,
20540,
64,
323,
7568,
989,
64,
627,
644,
420,
9417,
11,
584,
636,
12304,
922,
10283,
315,
6603,
1694,
4756,
2391,
220,
679,
21,
1389,
10213,
79250,
41472,
37731,
323,
27582,
719,
449,
264,
2478,
37375,
13,
1115,
9417,
574,
12715,
389,
6186,
220,
1114,
339,
11,
220,
679,
21,
627,
40052,
44498,
11826,
596,
41258,
922,
539,
5115,
25270,
578,
44383,
315,
20704,
3686,
627,
9642,
11,
7568,
3952,
1077,
220,
19,
4771,
6418,
311,
1518,
7834,
15317,
25,
578,
11994,
18371,
71837,
13,
1283,
10456,
433,
4999,
12947,
311,
53976,
1919,
18181,
369,
65774,
59027,
2881,
4999,
40,
574,
264,
2766,
22568,
922,
2555,
9932,
2391,
420
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
14262,
311,
279,
27219,
7962,
45707,
9417,
315,
279,
31125,
304,
279,
350,
3829,
3806,
18181,
21685,
555,
20540,
64,
323,
7568,
989,
64,
627,
644,
420,
9417,
11,
584,
636,
12304,
922,
10283,
315,
6603,
1694,
4756,
2391,
220,
679,
21,
1389,
10213,
79250,
41472,
37731,
323,
27582,
719,
449,
264,
2478,
37375,
13,
1115,
9417,
574,
12715,
389,
6186,
220,
1114,
339,
11,
220,
679,
21,
627,
40052,
44498,
11826,
596,
41258,
922,
539,
5115,
25270,
578,
44383,
315,
20704,
3686,
627,
9642,
11,
7568,
3952,
1077,
220,
19,
4771,
6418,
311,
1518,
7834,
15317,
25,
578,
11994,
18371,
71837,
13,
1283,
10456,
433,
4999,
12947,
311,
53976,
1919,
18181,
369,
65774,
59027,
2881,
4999,
40,
574,
264,
2766,
22568,
922,
2555,
9932,
2391,
420,
-100
] |
The Financial and Consumer Affairs Authority (FCAA) is offering advice to students about credit card usage to help them responsibly use their first credit card. When used responsibly, a credit card can help build good credit history which is important when it's time to buy a car or a house.
Always make your minimum payment on time – At the very least, make the minimum payment by the due date and to avoid interest charges, pay off the full balance on time.
Don't share your PIN – If something happens to your account and you've given someone your PIN, you are on the hook.
Avoid cash advances - There often is a fee associated with this and interest is charged immediately.
Read your statement – Make sure your transactions recorded in the statement are accurate and check for any fraudulent and unauthorized charges. Fraudsters can sometimes gain access to your card without you noticing it.
It's not free cash – If you can't afford to pay it off right away, think twice before buying something with your credit card. Not all credit cards are the same, offering different interest rates, fees and rewards. Make sure to research which one is the right fit for you.
For more helpful information on credit card usage, visit http://fcaa.gov.sk.ca/financial-literacy/youth-parent-educators/credit-card-tips. | {
"redpajama_set_name": "RedPajamaC4"
} | 7,670 | [
128000,
791,
17961,
323,
26262,
23298,
22677,
320,
37,
29733,
8,
374,
10209,
9650,
311,
4236,
922,
6807,
3786,
10648,
311,
1520,
1124,
87388,
1005,
872,
1176,
6807,
3786,
13,
3277,
1511,
87388,
11,
264,
6807,
3786,
649,
1520,
1977,
1695,
6807,
3925,
902,
374,
3062,
994,
433,
596,
892,
311,
3780,
264,
1841,
477,
264,
3838,
627,
38195,
1304,
701,
8187,
8323,
389,
892,
1389,
2468,
279,
1633,
3325,
11,
1304,
279,
8187,
8323,
555,
279,
4245,
2457,
323,
311,
5766,
2802,
10405,
11,
2343,
1022,
279,
2539,
8335,
389,
892,
627,
8161,
956,
4430,
701,
28228,
1389,
1442,
2555,
8741,
311,
701,
2759,
323,
499,
3077,
2728,
4423,
701,
28228,
11,
499,
527,
389,
279,
9903,
627,
53216,
8515,
31003,
482,
2684,
3629,
374,
264,
11307
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
17961,
323,
26262,
23298,
22677,
320,
37,
29733,
8,
374,
10209,
9650,
311,
4236,
922,
6807,
3786,
10648,
311,
1520,
1124,
87388,
1005,
872,
1176,
6807,
3786,
13,
3277,
1511,
87388,
11,
264,
6807,
3786,
649,
1520,
1977,
1695,
6807,
3925,
902,
374,
3062,
994,
433,
596,
892,
311,
3780,
264,
1841,
477,
264,
3838,
627,
38195,
1304,
701,
8187,
8323,
389,
892,
1389,
2468,
279,
1633,
3325,
11,
1304,
279,
8187,
8323,
555,
279,
4245,
2457,
323,
311,
5766,
2802,
10405,
11,
2343,
1022,
279,
2539,
8335,
389,
892,
627,
8161,
956,
4430,
701,
28228,
1389,
1442,
2555,
8741,
311,
701,
2759,
323,
499,
3077,
2728,
4423,
701,
28228,
11,
499,
527,
389,
279,
9903,
627,
53216,
8515,
31003,
482,
2684,
3629,
374,
264,
11307,
-100
] |
Pet-wise
At Home on the Hill
Morning Rundown
Sean Meehan May 31, 2016 at 9:00am
Questions Remain After District Council Votes to Move Ward 6 Homeless Shelter to Mount Vernon Triangle — Mount Vernon Triangle residents are questioning the process of selecting sites for homeless shelters after the District Council voted to move the proposed Ward 6 shelter location from Southwest to 2nd and K streets NW. [Washington City Paper]
Jefferson Middle School, Capitol Hill Montessori to Receive Improvement Funds — As part of the proposed 2017 education budget, Jefferson Middle School at 801 7th St. SW could receive $1 million to upgrade its science labs while Capitol Hill Montessori at 215 G St. NE is slated to receive $4 million to pay for a new heating and cooling system. [Hill Rag]
Interviewing the Owner Behind Capitol Hill's Most Unique Bookstore — Jim Toole, the owner of Capitol Hill Books, spoke to Washingtonian magazine about his unorthodox organization and his handwritten rules posted throughout the store. [Washingtonian]
Navy Yard Eatery Due South Eyeing Satellite Location on Yards Park Boardwalk — Navy Yard restaurant Due South is in the early stages of planning "Due South Dockside," along the Yards Park boardwalk to serve drinks and a limited food menu. [JDLand]
Monthly Capitol Hill Area ANC Meeting Roundup — Hill Rag takes a look at what happened last month with Capitol Hill area ANCs, including 6A, 6B, 6C and 6D. [Hill Rag]
Sean Meehan January 5, 2016 at 9:25am
Bayou Bakery Expands Dinner Service Starting Friday — Capitol Hill eatery Bayou Bakery will start serving dinner on Friday, with plans to serve fried chicken livers, seared Cajun pork belly and blue crab fritters. [Washington Post]
Turf Athletic Field at Randall Recreation Center Almost Complete — Construction on a new turf athletic field at Randall Recreation Center in Southwest is almost complete. The field includes a new scoreboard, soccer field and baseball/softball field. [SWTLQTC]
NoMa Parks Foundation Purchases Two Acres North of New York Avenue NE — The NoMa Parks Foundation purchased two acres from Pepco at the northern end of NoMa to convert into a park. It's the second park purchased by the parks foundation, a branch of the NoMa Business Improvement District. [Washington Business Journal]
Sean Meehan November 2, 2015 at 9:00am
Group Opposed to Hine Project Development Files Freedom of Information Act Request for ANC Documents — The Hine Coalition, a group of Capitol Hill residents opposed to the Hine Project development next to Eastern Market, have filed a Freedom of Information Act Request for documents related to ANC 6B's consideration of the project. [Capitol Hill Corner]
Monthly Capitol Hill Area ANC Meeting Roundup — Hill Rag takes a look at what happened last month with Capitol Hill area ANCs, including 6A, 6B, 6C, 6D and 6E. [Hill Rag]
Pedestrian Killed in Car Accident on Maine Avenue SW on Friday — A person driving a car struck a pedestrian just before 8:30 p.m. Friday on Maine Avenue SW. The pedestrian died shortly after arriving at the hospital. [WUSA]
Meet the Neighbors: Hill East's Spider Lady and Her Famous Halloween House — Lara Walker, 48, is the self-proclaimed "Mama Spider" behind the Capitol Hill spider house at the intersection of 13th Street and South Carolina Avenue SE. Almost every Halloween, the elaborate decorations seem to weave their way out of the brick home. [Hill Now]
Ward 6 Elects 16 New ANC Commissioners
Andrea Swalec November 5, 2014 at 11:55am
While Hill residents cast their votes in local and citywide races, they selected Advisory Neighborhood Commission representatives, too.
The ANCs will have 16 new commissioners among 38 total, Board of Elections results show. ANC 6A and 6B will have the largest overhauls, with 5 out of 8 and 7 out of 10 members set to be new, respectively.
Here's how the ANC candidates stacked up, with incumbents indicated with an asterisk.
ANC 6A 01: Omar Mahmud (34.1 percent)*
ANC 6A 02: Phil Toomajian (72.6 percent)
ANC 6A 03: no candidate; write-in winner to be announced
ANC 6A 04: Matt Levy (61 percent)
ANC 6A 05: Patrick Malone (50.4 percent)
ANC 6A 06: Stephanie Zimny (47 percent)
ANC 6A 07: Sondra Phillips-Gilbert (79 percent)*
ANC 6A 08: Calvin Ward (74.4 percent)*
ANC 6B 01: Jennifer E. Samolyk (69.5 percent)
ANC 6B 02: K. Diane Hoskins (49.7 percent)
ANC 6B 03: James Loots (29 percent)
ANC 6B 04: Kirsten Oldenburg (78.4 percent)*
ANC 6B 05: Steve Hagedorn (48.8 percent)
ANC 6B 06: Nick Burger (43 percent)
ANC 6B 07: Daniel Chao (72.3 percent)
ANC 6B 08: Chander Jayaraman (69.6 percent)*
ANC 6B 09: Brian Flahaven (85 percent)*
ANC 6B 10: Kathryn Denise Rucker (49.4 percent)
ANC 6C 01: Daniele Megan Schiffman (67.3 percent)*
ANC 6C 02: Karen J. Wirt (70.3 percent)*
ANC 6C 03: Scott Price (72.8 percent)*
ANC 6C 04: Mark Eckenwiler (71.7 percent)*
ANC 6C 05: Chris Miller (43 percent)
ANC 6C 06: Tony T. Goodman (81.4 percent)* Read More
Andrea Swalec October 27, 2014 at 9:00am
Biking on H Street NE — Cyclists will be encouraged to bike on streets adjacent to H Street NE, but will not be banned from biking on the street, the District Department of Transportation said. [Washington City Paper]
Future of the Streetcar System — City officials have scaled back plans for additional streetcar lines citywide. Current funding will allow about 8 miles of tracks, not the previously planned 22 miles, the DDOT director said. [WAMU]
New Cafe in Hill East — The cafe planned for 12th and E streets SE will have a European feel and is slated to open in the spring. [The Hill Is Home]
Infrastructure at Buzzard Point — Pepco has bid to build a substation just north of the proposed D.C. United stadium site, in "anticipation of the higher-density development yet to come to southwest D.C." [Washington Business Journal]
Community Meeting Schedule — Capitol Hill Corner compiled a list of this week's ANC meetings. On the agenda: a statue in Marion Park and what to do with land near the Stadium-Armory Metro station. [Capitol Hill Corner]
Dupont / Logan | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 7,203 | [
128000,
35919,
45539,
198,
1688,
5492,
389,
279,
8270,
198,
85444,
432,
1263,
785,
198,
60916,
386,
2176,
10118,
3297,
220,
2148,
11,
220,
679,
21,
520,
220,
24,
25,
410,
309,
198,
36349,
92692,
4740,
11182,
9251,
66393,
311,
14903,
27738,
220,
21,
5492,
1752,
75921,
311,
10640,
60237,
39131,
2001,
10640,
60237,
39131,
11062,
527,
34685,
279,
1920,
315,
27397,
6732,
369,
23855,
52888,
1306,
279,
11182,
9251,
16626,
311,
3351,
279,
11223,
27738,
220,
21,
23756,
3813,
505,
46785,
311,
220,
17,
303,
323,
735,
14708,
42174,
13,
510,
39231,
4409,
18343,
933,
39727,
1293,
12877,
6150,
11,
32633,
8270,
9995,
8473,
72,
311,
38522,
53751,
61288,
2001,
1666,
961,
315,
279,
11223,
220,
679,
22,
6873,
8199,
11,
34644,
12877,
6150,
520,
220,
17973
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
35919,
45539,
198,
1688,
5492,
389,
279,
8270,
198,
85444,
432,
1263,
785,
198,
60916,
386,
2176,
10118,
3297,
220,
2148,
11,
220,
679,
21,
520,
220,
24,
25,
410,
309,
198,
36349,
92692,
4740,
11182,
9251,
66393,
311,
14903,
27738,
220,
21,
5492,
1752,
75921,
311,
10640,
60237,
39131,
2001,
10640,
60237,
39131,
11062,
527,
34685,
279,
1920,
315,
27397,
6732,
369,
23855,
52888,
1306,
279,
11182,
9251,
16626,
311,
3351,
279,
11223,
27738,
220,
21,
23756,
3813,
505,
46785,
311,
220,
17,
303,
323,
735,
14708,
42174,
13,
510,
39231,
4409,
18343,
933,
39727,
1293,
12877,
6150,
11,
32633,
8270,
9995,
8473,
72,
311,
38522,
53751,
61288,
2001,
1666,
961,
315,
279,
11223,
220,
679,
22,
6873,
8199,
11,
34644,
12877,
6150,
520,
220,
17973,
-100
] |
Rental forklift listings for this dealership are currently unavailable on ToyotaForklift.com. Discover available rental options from this dealer by selecting and contacting one of the locations from the lefthand drop-down menu.
© 2019 Toyota Lift Northwest. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,603 | [
128000,
49,
6430,
369,
10784,
2130,
26544,
369,
420,
62296,
527,
5131,
36087,
389,
30300,
37,
672,
36069,
916,
13,
34039,
2561,
19160,
2671,
505,
420,
24204,
555,
27397,
323,
47208,
832,
315,
279,
10687,
505,
279,
514,
69,
339,
438,
6068,
15220,
5130,
627,
20644,
220,
679,
24,
30300,
53535,
40505,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
49,
6430,
369,
10784,
2130,
26544,
369,
420,
62296,
527,
5131,
36087,
389,
30300,
37,
672,
36069,
916,
13,
34039,
2561,
19160,
2671,
505,
420,
24204,
555,
27397,
323,
47208,
832,
315,
279,
10687,
505,
279,
514,
69,
339,
438,
6068,
15220,
5130,
627,
20644,
220,
679,
24,
30300,
53535,
40505,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Марш женщин состоялся 9 августа 1956 года в Претории; был направлен против распространения закона о паспорте 1952 года на чернокожих женщин. Целью участников марша была петиция об отмене этого закона, которую они хотели подать примьер-министру Стрейдому.
Причины
В 1950 году были введены законы о регистрации населения, предписывающий каждому жителю быть зарегистрированным как белый, цветной или банту, закон о паспорте, а также акт о групповых областях, разделявший страну на несколько расовых областей. В результате введения системы апартеида чернокожему населению запретили находится на территории для белых. В 1952 году был издан закон о паспортах, обязывающий каждого не.белого гражданина страны иметь при себе паспорт с фото, личными данными и информации о его трудоустройстве. С этого года также каждый чернокожий мужчина не имел право находится на территории для белых более 72 часов, только если он не предоставлял документ о своем трудоустройстве на данной территории. Причем работодателем мог выступать только белый гражданин. В 1956 году это ограничение стало распространяться и на чернокожих женщин, сделав фактически невозможным совместное проживание чернокожей семьи, если только женщина также не была трудоустроена в данном регионе.
В 1954 году была основана Федерация женщин Южной Африки (Federation of South African Women), организация по борьбе с апартеидом, и включающую различные женские организации, в том числе и Женскую лигу Африканского национального конгресса. В 1955 году на Конгрессе народов была подписана Хартия свободы, в создание которой также участвовала Федерация женщин, составившая одну из частей под названием «Что требует женщина» и требовавшая для женщин обеспечение ухода за детьми, жилье, образование, равную оплату и равные права с мужчинами в отношении к собственности, браку и опеке над детьми. К 1956 году Федерация женщин стала также выступать против системы пропусков на территорию белых для чернокожих женщин.
Известные участницы
София Уильямс-Де Брюйн, ей было всего 18 лет, что делало её самой молодой из четырёх лидеров.
Примечания
Апартеид в ЮАР
Марши протеста
Август 1956 года
1956 год | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 2,760 | [
128000,
39091,
17721,
12426,
120524,
105041,
103285,
220,
24,
120084,
220,
6280,
21,
101932,
5927,
80584,
8341,
9239,
47273,
26,
102885,
107224,
61498,
104863,
115679,
18999,
59313,
74828,
8379,
113434,
115345,
51627,
220,
6280,
17,
101932,
13373,
90211,
107432,
21956,
67745,
120524,
13,
101398,
26503,
12182,
105763,
103903,
104325,
102569,
105129,
5173,
107374,
71829,
21923,
20879,
38972,
1532,
103117,
59313,
74828,
11,
117440,
102560,
103860,
61642,
40842,
18482,
117288,
127700,
113634,
19479,
35111,
20346,
28599,
101231,
21708,
7094,
72952,
382,
103331,
110957,
720,
16604,
220,
6280,
15,
103361,
105170,
117589,
79686,
59313,
105832,
8379,
18600,
78927,
22911,
57186,
117213,
11,
57925,
30765,
101070,
107834,
89666,
72952,
102979,
109084,
62731,
11122,
17721,
78927,
31203,
24803,
28241,
6578,
52770,
107687,
35723,
11,
103871,
39988,
46177,
104235,
89348,
11,
103503,
8379
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
39091,
17721,
12426,
120524,
105041,
103285,
220,
24,
120084,
220,
6280,
21,
101932,
5927,
80584,
8341,
9239,
47273,
26,
102885,
107224,
61498,
104863,
115679,
18999,
59313,
74828,
8379,
113434,
115345,
51627,
220,
6280,
17,
101932,
13373,
90211,
107432,
21956,
67745,
120524,
13,
101398,
26503,
12182,
105763,
103903,
104325,
102569,
105129,
5173,
107374,
71829,
21923,
20879,
38972,
1532,
103117,
59313,
74828,
11,
117440,
102560,
103860,
61642,
40842,
18482,
117288,
127700,
113634,
19479,
35111,
20346,
28599,
101231,
21708,
7094,
72952,
382,
103331,
110957,
720,
16604,
220,
6280,
15,
103361,
105170,
117589,
79686,
59313,
105832,
8379,
18600,
78927,
22911,
57186,
117213,
11,
57925,
30765,
101070,
107834,
89666,
72952,
102979,
109084,
62731,
11122,
17721,
78927,
31203,
24803,
28241,
6578,
52770,
107687,
35723,
11,
103871,
39988,
46177,
104235,
89348,
11,
103503,
8379,
-100
] |
TV Report Card | 'Bates Motel' Season 2 Review
Overview: Norma attempted to hold together the fragile life-force of her family and business, Norman continued his descent into madness, Dylan became more engrossed in the local drug cartel, as Emma felt on the periphery of all of the excitement. Meanwhile, Sheriff Romero tried to keep the peace in White Pine Bay.
Storyline Pros: For the Bates family it was a season filled with criminal intrigue, romantic excursions and the surfacing of dark secrets. The only series to consistently deliver in every episode, "Bates Motel" lived up to its outstanding freshman season and then some. Picking up after last year's cliffhanger concerning the murder of Miss Watson, Norman was inconsolable as the airiness of summer, soon gave way to sinister truths. Norma's fear for his mental health reached perilous heights and their relationship started to buckle under the strain of their shared fear.
The most fascinating aspect of the series continues to be the art of its ambiguity. It wisely avoids painting itself into a distinct corner, remaining malleable to several interpretations, which works heavily in its favor. It's more lifelike in that regard as reality isn't always so cut and dry.
Norma, by far the most fascinating female character on television, is a force of maternal nature and feminine resilience, the gritty survivor trying to thrive in the face of bleak odds. This season her journey as a mother saw its share of obstacles. Her relationship with her two sons grew tricky as her confession to Norman last season played out in surprising fashion. "Bates" went for the jugular in a bold plot twist that dared to push the limits of a taboo subject. While some shows would've simply played it for shock, "Bates" played it for story, hitting its emotional notes and fallout with utter sincerity.
As much as Norma openly tries to be a good mother to Norman, it was watching her admit she'd not tried half as hard for Dylan and why, that led to her greatest evolution. The journey of the Bates family's dynamic from delicate togetherness at the start of the season to being torn apart in conflict and then trying to find their way back together again was a core storyline that breathed into every facet of the other plots.
The drug storyline intersected them with the rest of the town, which was essential to the umbrella story. It also drew Sherriff Romero into things, putting him back in Norma's orbit. Emma's entwinement with the family provided a pure juxtaposition to the often muddled moral waters they were immersed in. She's innately good and a strong moral compass for the show.
There continues to not be a single weak character in the ensemble as they are all written with exceptional profundity. The protagonists are flawed in mysterious ways and "Bates" consistently challenges its audience to try to judge their decisions and intent. The fact is you're often too engrossed in them to ever make a call.
Storyline Cons: Flawless. There wasn't one misstep.
Production Caliber: The production felt more open this season as the town become more of a character.
Performance Quality: The best ensemble on television. Vera Farmiga was dazzlingly brilliant as she conveyed Norma's desperation, as the empirical proof her beloved son was suffering from a deteriorating psyche became impossible to ignore. Farmiga always knows how to strike the perfect balance between Norma's optimistic approach to survival and the thin veneer hiding her shaky confidence it will actually come to fruition. Only Farmiga could bring such pathos to a singing scene and make you feel every ounce of what she didn't need words to say.
Freddie Highmore continues to astound as Norman, his performance consistently breaks ground on emotional levels that continually adds dimension to the oft enigmatic Bates. Highmore demonstrated the crippling level of Norman's mental illness in the finale with such devastating conviction that it made other's response to protect him, completely comprehensible.
As Norma's eldest son, Max Thieriot gave a subtle, poignant and highly effective performance. There's a raw vulnerability and ferocity that he imbues in Dylan that complements the ensemble's characterizations. His portrayal is one of the most crucial and underrated turns of the series.
Olivia Cooke's quirky charm and girl-next-door tenacity as Emma; created a character you continually wanted to see more of. While Nestor Carbonell brought magnificent personality to the role of Sheriff Romero, his chemistry with Farmiga an unmistakable gem.
Overall Grade: A+ [Best Television Series of the Year], expectations were high and Carlton Cuse and Kerry Ehrin delivered. Dark, light, twisted with a touch of innocence all rolled into one. In the course of 10 episodes, they took viewers on a roller coaster ride, bringing them conflict, romance, treachery, action and family drama.
Immaculately written, performed and directed, watching an episode of "Bates Motel" unfold should feel inevitable given we all know how it ends and yet its beauty is in making one hope we don't.
Labels: Bates Motel, Reviews, television, TV Report Card | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 7,831 | [
128000,
16027,
8423,
6938,
765,
364,
33,
988,
19514,
301,
6,
14598,
220,
17,
10506,
198,
42144,
25,
20935,
64,
17644,
311,
3412,
3871,
279,
45350,
2324,
81149,
315,
1077,
3070,
323,
2626,
11,
41168,
8738,
813,
38052,
1139,
52819,
11,
44458,
6244,
810,
2995,
2177,
291,
304,
279,
2254,
5623,
80740,
11,
439,
36035,
6612,
389,
279,
824,
94648,
315,
682,
315,
279,
28361,
13,
26982,
11,
29783,
78487,
6818,
311,
2567,
279,
9096,
304,
5929,
42609,
9332,
627,
18422,
1074,
32134,
25,
1789,
279,
74962,
3070,
433,
574,
264,
3280,
10409,
449,
9337,
81613,
11,
24364,
3521,
76339,
323,
279,
20884,
4628,
315,
6453,
24511,
13,
578,
1193,
4101,
311,
21356,
6493,
304,
1475,
9417,
11,
330,
33,
988,
19514,
301,
1,
12439,
709,
311,
1202
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
16027,
8423,
6938,
765,
364,
33,
988,
19514,
301,
6,
14598,
220,
17,
10506,
198,
42144,
25,
20935,
64,
17644,
311,
3412,
3871,
279,
45350,
2324,
81149,
315,
1077,
3070,
323,
2626,
11,
41168,
8738,
813,
38052,
1139,
52819,
11,
44458,
6244,
810,
2995,
2177,
291,
304,
279,
2254,
5623,
80740,
11,
439,
36035,
6612,
389,
279,
824,
94648,
315,
682,
315,
279,
28361,
13,
26982,
11,
29783,
78487,
6818,
311,
2567,
279,
9096,
304,
5929,
42609,
9332,
627,
18422,
1074,
32134,
25,
1789,
279,
74962,
3070,
433,
574,
264,
3280,
10409,
449,
9337,
81613,
11,
24364,
3521,
76339,
323,
279,
20884,
4628,
315,
6453,
24511,
13,
578,
1193,
4101,
311,
21356,
6493,
304,
1475,
9417,
11,
330,
33,
988,
19514,
301,
1,
12439,
709,
311,
1202,
-100
] |
In 2014, Harold Holzer published "Lincoln and the Power of the Press" suggesting that Lincoln, from the time he wrote a letter to the Sangamon Journal in 1831, methodically used newspapers for over twenty five years to build a constituency for his future political ambitions to become the Illinois Governor, Senator, Vice President, or even President. Holzer, and other writers who subsequently jumped on the bandwagon (and gravy train), assert that Lincoln was able to get editors and publishers to promote his agenda through friendship, flattery, and even political favors. Further, they claim that after he won the Republican nomination for president in 1860, his manipulations became more frequent and pronounced; then as President, when persuasion did not work, he intensified efforts to control, intimidate, and censor the press. While Holzer tends to give Lincoln credit for some restraint during a violent Civil War, and gives him a generally favorable overview, other writers level more serious, and spurious, charges.
On the other hand, most Lincoln scholars believe that he had no preconceived notion to use the press to further his political objectives until at least 1854. For the most part, he simply enjoyed interaction with the press; whether by letters to editors which were published and would often result in a dialogue, or by personal interviews with reporters, editors, and publishers.
But, by 1854, things did change. Lincoln realized that his rapport with many newspapers provided him with a forum to express his opposition to the expansion of slavery, and could be helpful as he planned to again run for office after a seven year hiatus. Then, as President, he intensified his efforts to manage newspaper coverage of events during the Civil War, providing credence to the charge that he "manipulated" the press.
What were these circumstances that began Lincoln's evolution from simply enjoying the banter with the press, to then utilizing the press to enhance his political opportunities and further his objectives for public policy, and finally to consider interference with the press?
By 1850, the differences over the issue of slavery began to cause serious unrest throughout the country. Some wanted slavery abolished, others (like Lincoln) wanted it controlled to the limited number of states authorized under the Constitution, and some wanted it not only preserved but expanded to other states and territories. Lincoln abhorred slavery and, in 1854, began to use the public forums he had gained in newspapers over the past 25 years to articulate his opposition to Congressional compromises that would permit the expansion of slavery.
Also, seven years after his last campaign, he began to think about re-entering politics.
In 1854, the first evidence surfaced that Lincoln planned to cultivate editors and publishers who would be proponents for his future campaigns, rather than just publish his public policies. After announcing that he would switch to the new Republican Party, Lincoln called on Joseph Medill, owner/publisher of the Chicago Tribune, who believed that Lincoln could convince members of the dying Whig Party to become Republicans. After his successful alliance with Medill, the Tribune ran numerous articles promoting Lincoln and his political positions and he even used offices at the newspaper when he was in Chicago. And, over the next four years Lincoln cultivated relationships with other prominent editors and publishers as he made a concerted effort to win the 1858 appointment as the United States Senator from Illinois. Although the Democrat party held a majority in the Illinois Legislature, which would make the Senatorial appointment, Lincoln garnered enough votes from non-Republicans to make the selection close; but he still lost to Stephen A. Douglas.
However, he emerged from that race with positive national exposure due to the public interest in the Lincoln-Douglas debates, and renewed his efforts for a run for Governor or the next Senate appointment in 1860. To capitalize on the exposure, he regularly sent excerpts from the debates and related speeches to newspapers throughout the North, and he financially helped publish a best-selling book about the debates. After his acclaimed speech in opposition to slavery at Cooper Union in New York City in early 1860, Lincoln assured that the text was provided to newspapers throughout the northern states.
Generally, until he won the Republican nomination for President in June 1860, newspapers in the north were favorable to Lincoln even if they endorsed one of the perceived stronger Republican candidates. Many thought his life story was quaint and would be interesting to their readers, but that he could not win the nomination. However, after his nomination, there was a discernible change in reporting of his speeches, editorial replies to his letters, and observations by publishers of newspapers aligned with the Republican Party; especially if the paper had strongly endorsed another candidate for the nomination, as almost all did.
His honeymoon with the press was over!
Now began what one recent author titled "Lincoln's War for Public Opinion" and what another, with all of the hyperbole he could muster, called "Lincoln's assault on the freedom of the press." And, it is at this period of time (1860-1861) to which those authors who are critical of Lincoln's relationship with the press can point with some reason to question his motives.
Lincoln embarked on a concerted effort to affect the manner in which newspapers covered his candidacy and then, after he won the election, intensified his effort to manage the press. Among other steps, he invested in a German language newspaper to support his candidacy, and he began to single out certain newspapers for interviews that he expected would lead to favorable commentary in the press.
President Lincoln never held a formal news conference. He preferred to meet individually with reporters, almost always in the presence of one of his secretaries or a Cabinet member. He would also allow reporters to stop by the White House and, if he had the time, would permit a quick meeting; if not, the reporter could jot down a few questions and Lincoln would usually reply within the same day. But, this was not just a courtesy to the press. Lincoln said he usually gained more information than he gave since reporters often had received telegraphed news even before he received official reports.
He also offered certain reporters and publishers favored access to the White House and in return, he expected his administration's policies would receive positive mention in their papers. Early in his Presidency Lincoln sought to reward John Forney, publisher of the both the Philadelphia Press and the Washington based Sunday Morning Chronicle for a continuing stream of favorable commentary. Forney was not only given a position as "Secretary" for the Republican Caucus in Congress, but his newspapers received regular payments for advertising by the State Department and War Department. Lincoln even occasionally wrote a "position paper" which would appear first in Forney's publications. Was this good management of the press or was it manipulation?
In another instance, Lincoln became aggravated by New York Tribune publisher Horace Greeley's constant insistence that Lincoln give abolition an equal standing with preservation of the Union as reason for continuing the Civil War. After several vicious editorials, the President finally agreed to provide Greeley with a definitive statement on the matter. Greeley considered that he had won a concession from the President and announced in his paper that he had demanded a clarification statement and that Lincoln had conceded. Lincoln then wrote the famous letter in which he said (paraphrased) that his primary goal was the Preservation of the Union and that if he could save the Union by freeing every slave, or only freeing some slaves, or even by freeing no slaves, he would do it. Then late on a Saturday, Lincoln sent the original to Greeley and a copy to the Washington National Intelligencer. Lincoln knew that Greeley did not publish on Sunday but the Intelligencer did, so the "scoop" that Greeley wanted was printed a day earlier in Washington and in all New York papers on Monday. Lincoln's actions might be considered "manipulation" by some; but others believe that the egotistical Greeley got what he deserved.
There is sometimes a fine line between Presidential recognition and perceived patronage. During his re-election campaign of 1864, Lincoln reached out to James Gordon Bennett, publisher of the very influential New York Herald, who had been highly critical of Lincoln's conscription policies. Lincoln still thought Bennett was honorable and respected Bennett's world understanding. Through an intermediary, Lincoln asked if Bennett would consider becoming Ambassador to France, an offer that was intended as a show of respect and to let Bennett know that Lincoln harbored no ill feelings. Bennett graciously declined and the episode resulted in at least respectful relations between the two men. However, the offer became an embarrassment to Lincoln and Bennett when it was leaked to other newspapers which then nearly unanimously called it a pay-off for favorable editorials. Some consider that the episode was a failed attempt by Lincoln at manipulation of the press; but was it?
As President, he did not always have to become personally involved in press management, as he had a ready supply of surrogates. His Generals frequently refused to cooperate with the press and some even detained reporters and publishers. Lincoln quietly supported some but reigned in others. General William Tecumseh Sherman had little tolerance for the press, once saying that he hated "men who will not take a musket and fight, but will follow an army to pick up news for sale." Sherman even convened a courts-martial to try Thomas Knox , a reporter from the New York Herald who had told the General to his face that he "led with insanity and inefficiency" on the battlefield. The court convicted Knox of the minor infraction of "Accompanying the army without permission" and Sherman's only available punishment was to thereafter ban Knox from his command. Lincoln, not wanting to embarrass one of his top Generals, waited a few weeks to pardon Knox, but asked the Herald to keep him away from Sherman.
But, there was one instance in which Lincoln directly ordered the closure of a northern newspaper. Since mid-1863, New York City had been a hotbed of draft resistance with large scale riots resulting in several thousand injuries and hundreds of deaths, and federal troops had been required to restore order. On May18th, 1864, the New York World fabricated a story, even forging Lincoln's signature on a fake proclamation, which declared a new draft for up to 400,000 troops. Public outrage was immediate and dangerous. Lincoln responded the following day in telegraphs to all New York papers in which he called the story false, wicked, traitorous, treasonous, and provided aid to the enemy. But the World not only repeated the concocted story, but added other "invented" material and, as a result, Lincoln ordered the publisher arrested and the newspaper prevented from any further publication. Lincoln later said that he never regretted the decision because New York had been the scene of terrible rioting initiated by opponents of the draft and he saw the fabricated proclamation as incendiary.
Lincoln didn't mind so much if newspaper articles were critical of him personally. However, he was concerned if an article attacked his decisions as Commander-in Chief as either too cautious or, contrarily, as too aggressive; and he would occasionally issue an open letter that he knew would be published in many newspapers. For example, he quickly and forcefully responded when several publishers attempted to sway public opinion to support a so-called Unilateral Peace Initiative, which called for an end to the war but left the Confederate states as an independent nation. Lincoln was committed to re-unification of the country, and thought the proposal suggested that the sacrifices of hundreds of thousands of soldiers would have been in vain. In this case, Lincoln had the support of most Northern newspapers so he only had to "suggest" that those loyal publishers point out the folly of such a settlement.
In my opinion, Lincoln did not begin to manipulate the press as a young man to promote his political ambitions, he just enjoyed the process. And later in life he generally used his rapport with newspaper publishers to place his political views, and his candidacy, before the citizens; which might, at worst, be called press management.
However, many Lincoln scholars (and I) share the view that some of his actions when he was President are more difficult to defend. So, as President, did he appropriately manage, or inappropriately manipulate (even coerce), the press? Under the circumstances, were his actions justified, or not?
The answers are not so easy, but I give him the benefit of the doubt.
Most politicians today have a love-hate relationship with the press. Early in their careers they love to gain the name recognition that press coverage brings and the opportunity to get their message (sometimes a changing message) out to the voters. But they hate criticism of their positions and at times (almost unanimously) feel the press is unfair.
Not much has changed in the last 150 years!
Abraham Lincoln and the press had a "love" relationship from about 1831 until 1860, which was followed by a sometimes tumultuous "hate" relationship. When he was younger, Lincoln was an avid reader of the few books available to him, but the various newspapers, which found their way into his rural central Illinois area, were his primary source of reading material. Newspapers were the mass media of the day, handed down to many readers beyond the original recipient and usually posted on community bulletin boards. His step-mother recalled that his first published letter was on the "evils of drink," written when he was nineteen, which a friend had forwarded to a popular journal. Over the next few years, Lincoln wrote other short essays and humorous stories which also were reprinted in area newspapers. As a young man, he became a part-time postmaster and said that the best part of the job was that he was able to read all of the newspapers meant for his neighbors. His first "letter to the editor" to espouse a political point was published in the Springfield, Illinois Sangamo Journal on March 15,1832, in which he supported dredging the Sangamon River to make it navigable. Was it just happenstance that he intended to run for a seat in the Illinois House of Representatives later that year?
In 2014, Harold Holzer, a respected historian of the Civil War, published "Lincoln and the Power of the Press" in which he claimed that Lincoln cleverly used the newspapers, first in Springfield, then later throughout Illinois and other northern states, for over twenty-five years to build a constituency for his future political ambitions. Holzer wrote that Lincoln was able to lead the editors and publishers to support his candidacy and his political positions, when they might have otherwise not done so. He further asserts that, after Lincoln won the Republican nomination for President in 1860, his manipulations became more frequent and pronounced; and then as President, when persuasion would not work, he intensified efforts to control and censor the press.
Holzer is generally favorable to Lincoln and opines that he showed restraint when some politicians called for extensive censorship during the Civil War. But, as always occurs after a new "Lincoln" theory is postulated, a herd of other writers and commentators joined in the fray and began to sensationalize the issue. A frequent charge was that Lincoln consistently abused his Presidential power in a methodical attack on freedom of the press. Some of these other authors, but not Holzer, even confuse Lincoln's several suspensions of Habeas Corpus (the right to hear charges in a court) during the Civil War with the separate issue of Freedom of the Press. In fact, Lincoln intervened in several cases where northern politicians and Union Generals tried to ignore Habeas Corpus to control opposition press; and never ordered the suspension of this fundamental right specifically directed at the management or reporters of a newspaper.
Holzer was at least partially correct about Lincoln's relationship with the press, but the more vehement authors were further off-base. While some of Lincoln's actions later in his political career show that he knew how to use the press to his own advantage, it is un-historic to claim that, as a young man, Lincoln had any Machiavellian motive for his frequent letters and articles to the press. On the other hand, Lincoln might be reasonably characterized as "managing" the press after 1854 during his campaigns for the U.S. Senate and the 1860 Presidential race. And, after the Civil War began, he did take actions (or failed to take action) that at least opens the door to charges of manipulation of the press. When discussing Lincoln's relationship with the press, the words "used, managed, and/or manipulated" are distinctions, not just semantics.
In his twenties, Abraham Lincoln was very intelligent, but he was not a prophet who foresaw his political future. When he began to regularly write letters to newspapers, he was living in tiny New Salem, a few miles from Springfield. He was working as a store clerk, surveyor and part time postmaster and he was still undecided on a career. At the time he certainly had no national political aspirations; he just enjoyed the interpersonal exchanges, both accolades and criticisms, which resulted from his letters. Encouraged by friends and neighbors, he became interested in politics and, after a failed attempt in 1832, won four consecutive elections to the Illinois House of Representatives. In 1837 he moved to Springfield to begin his law career and, for the first time, he lived in a community with a local newspaper and he became a regular contributor to the four- page Sangamo Journal. Lincoln recognized that newspapers gave him an opportunity to express his ideas to a larger audience whether he wanted to weave a humorous tale, offer an opinion on an issue of the day, or satirize a politician. While the publication of his letters and articles provided name recognition which helped politically, it was even more valuable to Lincoln in building his new law practice; the primary financial resource for him and his family.
Springfield, which was the county seat and soon would become the State Capital, consistently had a least two newspapers. These competing publications provided national news a few days after the events, reports of local interest, advertisements, articles meant to entertain, space for letters to the editor, and political commentary.
Almost all newspapers were extremely partisan publications which touted the candidates and causes for which they approved and eviscerated the opposition. Truth was only an occasional and frequently an unintentional by-product. However, even opposition papers often published Lincoln's letters and essays because most were humorous as he thought that a "light hearted jab did not sting as much" and he frequently poked fun at himself.
After his fourth term as a state legislator, during which he was Speaker of the House, Lincoln chose to leave office to focus on his law practice. Although he did not run for office for another five years, he consistently sent letters on many subjects to the newspapers; which at least puts a dent in the theory that he consistently used the press for political gain.
But, in 1846, he said "I again had the political itch and I had to scratch it" so he decided to run for a seat in the U.S. House of Representatives; despite the fact that his party did not hold a majority in his district. In an interesting twist, the incumbent unexpectedly announced his resignation to join the U.S. Army in anticipation of a war with Mexico and Lincoln was approached by several publishers who offered to support him for a direct interim appointment to Congress. Although it would have been a quicker and easier path to Congress, Lincoln declined because he thought he should win or lose in his own race. So much for manipulation of the press!
During his campaign for Congress Lincoln continued to write letters to newspapers in his district, however, his letters, and printed speeches, probably cost him some votes as he frequently expressed his concerns about President Polk's war with Mexico. He told friends that he realized that he was "swimming upstream" but thought "the people should know where I stand" on the war and "President Polk's land grab" in Mexico. Although he won the election, his constituency was shrinking because the War was popular with most Americans. Then, once he was seated in Congress, he became a vociferous critic of the War, and even opposed the surrender terms after the American victory; further depleting his base of support.
If, as some authors claim, his letters to newspapers were calculated to boost his political opportunities, then Lincoln made a catastrophic error! His correspondence with newspapers and Congressional votes related to the war with Mexico certainly cost him any chance for re-election. He chose to not run for a second term and he would not run for political office for another five years. Again, hardly a good example of manipulation of the press!
But, his flow of correspondence to newspapers never waned. His topics often included political issues, support for public works projects within Illinois, the benefits of railroad expansion, and generally favored Whig politicians over their Democrat opponents; and, of course, the occasional fictional "yarn" from his lively imagination.
He was most profound, however, when addressing the attempts in Congress in 1850 and 1854 to reach compromises with Southern states on the issue of expansion of slavery. While Lincoln accepted that slavery was permitted under the Constitution in certain states, he was adamantly opposed to the admission of slavery into the western states and northwestern territories. By 1854, his letters and speeches on the matter were widely covered by many newspapers in both the North and South. It is during this time when he developed a plan to use the newspapers to further his political career; but even then, his grandest hope was to become a U.S. Senator from Illinois or possibly Governor; but certainly not President of the United States.
Therefore, if the clock starts at 1854-1855, those authors may be justified who claim Lincoln "used" or "managed" (but not yet "manipulated") the press to advance his political career.
Part 2 of "Lincoln and the Press" explores his evolving attitudes about managing news coverage after 1856 and some of his more forceful actions as President after 1861, which might rationally be referred to by some as "manipulation" of the press. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,443 | [
128000,
644,
220,
679,
19,
11,
53215,
16071,
7215,
4756,
330,
51697,
22808,
323,
279,
7572,
315,
279,
8612,
1,
23377,
430,
25379,
11,
505,
279,
892,
568,
6267,
264,
6661,
311,
279,
52022,
31936,
10139,
304,
220,
10750,
16,
11,
1749,
2740,
1511,
32594,
369,
927,
17510,
4330,
1667,
311,
1977,
264,
65739,
369,
813,
3938,
5054,
51566,
311,
3719,
279,
19174,
24245,
11,
23072,
11,
23270,
4900,
11,
477,
1524,
4900,
13,
16071,
7215,
11,
323,
1023,
16483,
889,
28520,
27096,
389,
279,
7200,
94219,
320,
438,
88864,
5542,
705,
2105,
430,
25379,
574,
3025,
311,
636,
29846,
323,
36717,
311,
12192,
813,
18909,
1555,
27607,
11,
1344,
19187,
11,
323,
1524,
5054,
54947,
13,
15903,
11,
814,
3802,
430,
1306,
568,
2834,
279,
9540,
29804
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
644,
220,
679,
19,
11,
53215,
16071,
7215,
4756,
330,
51697,
22808,
323,
279,
7572,
315,
279,
8612,
1,
23377,
430,
25379,
11,
505,
279,
892,
568,
6267,
264,
6661,
311,
279,
52022,
31936,
10139,
304,
220,
10750,
16,
11,
1749,
2740,
1511,
32594,
369,
927,
17510,
4330,
1667,
311,
1977,
264,
65739,
369,
813,
3938,
5054,
51566,
311,
3719,
279,
19174,
24245,
11,
23072,
11,
23270,
4900,
11,
477,
1524,
4900,
13,
16071,
7215,
11,
323,
1023,
16483,
889,
28520,
27096,
389,
279,
7200,
94219,
320,
438,
88864,
5542,
705,
2105,
430,
25379,
574,
3025,
311,
636,
29846,
323,
36717,
311,
12192,
813,
18909,
1555,
27607,
11,
1344,
19187,
11,
323,
1524,
5054,
54947,
13,
15903,
11,
814,
3802,
430,
1306,
568,
2834,
279,
9540,
29804,
-100
] |
A Survey of Code-switched Speech and Language Processing
Sunayana Sitaram, Khyathi Raghavi Chandu, Sai Krishna Rallabandi, Alan W Black
Code-switching, the alternation of languages within a conversation orutterance, is a common communicative phenomenon that occurs in multilingualcommunities across the world. This survey reviews computational approaches forcode-switched Speech and Natural Language Processing. We motivate whyprocessing code-switched text and speech is essential for building intelligentagents and systems that interact with users in multilingual communities. Ascode-switching data and resources are scarce, we list what is available invarious code-switched language pairs with the language processing tasks theycan be used for. We review code-switching research in various Speech and NLPapplications, including language processing tools and end-to-end systems. Weconclude with future directions and open problems in the field.
Sunayana Sitaram Microsoft Research India Khyathi Raghavi Chandu, Sai Krishna Rallabandi, Alan W Black Carnegie Mellon University
Code-switching, the alternation of languages within a conversation or utterance, is a common communicative phenomenon that occurs in multilingual communities across the world. This survey reviews computational approaches for code-switched Speech and Natural Language Processing. We motivate why processing code-switched text and speech is essential for building intelligent agents and systems that interact with users in multilingual communities. As code-switching data and resources are scarce, we list what is available in various code-switched language pairs with the language processing tasks they can be used for. We review code-switching research in various Speech and NLP applications, including language processing tools and end-to-end systems. We conclude with future directions and open problems in the field.
code-switching, multilingualism, speech processing, Natural Language Processing, survey
Linguistic code choice refers to the use of a language for a specific communicative purpose and code-switching denotes a shift from one language to another within a single utterance. Not only is there a plethora of different languages across the world, but speakers also often mix these languages within the same utterance. In fact, some form of code-switching is expected to occur in almost every scenario that involves multilinguals handbook_languagecontact . This can go beyond mere insertion of borrowed words, fillers and phrases, and include morphological and grammatical mixing. Such shifts not only convey group identity codeswitching_socialidentity , embody societal patterning heller1982negotiations and signal cultural discourse strategies jacobson2011codeswitching but also have been shown to reduce the social and interpersonal distance maltese_distancestudy in both formal qian2009codeswitching ; rezvani2011code and informal settings.
In this paper we refer to this phenomenon as code-switching, though the term code-mixing is also used. While such switching is typically considered informal - and is more likely to be found in speech and in casual text as now found in social media - it is also found in semi formal settings such as navigation instructions and formal settings such as news paper headlines and formal teaching. Therefore, we argue that code-switching should not be looked down upon or ignored but be acknowledged as a genuine form of communication that deserves analysis and development of tools and techniques to be handled appropriately. As language technologies start permeating more and more applications that involve interactions with humans peabody2011methods ; antol2015vqa , it is imperative that they take phenomena such as code-switching into account.
Code-switching is most common among peers who have similar fluency in each language. For example fluent bilingual Spanish and English people may often float between their languages, in a form of communication called Spanglish. Indian sub-continent residents, who often have a substantial fluency in English will often mix their speech with their regional languages in Hinglish (Hindi), Tenglish (Telugu), Tamlish (Tamil) and others. But it is not just English that code-switching occurs with. Southern Mainland Chinese residents who, for example, speak Cantonese and Shanghaiese, may switch with Putonghua (standard Mandarin). Arabic Dialects are often mixed with Modern Standard Arabic. The distinction between languages and dialects is of course hard to define, but we see that code-switching appears with dialects too. African American Vernacular English (AAVE) speakers will commonly switch between AAVE and Standard American English; Scottish people may switch between Scots and Standard English. At an extreme, code-switching could also be used to describe register shifting in monolingual speech. Formal speech versus slang or swearing may follow similar functions and patterns as those in code-switching among two distinct languages.
1.1 Why should we care about code-switched language processing?
It is important to realize that humans are good at constructing language registers and learning new communication methods. Not only are we good at doing this with human-human communication, we also construct and learn to use such registers for human-machine communication efficiently, such as Linux command-line expressions, or the grammar of Alexa interactions. If we want machines to partake in such conversations, we need to also be able to understand what is being said in these registers.
For the large companies, understanding code-switched communication will enable better advertisement-targeting. Understanding genuine user sentiment about aspects of products helps improve future versions. For healthcare, understanding how people feel, if they are being open, will help to give better care, and enable better communication with patients, and better distribution and uptake of preventative care. For educators, communication in the right register for tutoring, or understanding if concepts are or are not understood. For entertainment, non-playing characters should communicate in the appropriate register for the game, and/or be able to understand natural code-switched communication with other players.
Unlike pidgins or creoles todd2003pidgins ; arends1995pidgins ; contact_languages_pidgins_creoles , where speakers may not have full fluency in the language of influence, we are primarily interested in situations where participants have fluency in each of the languages but are choosing not to stay within one language.
We would like to put this work in a common framework, but its probably still too early to fix such a framework. Code-switching is not a simple linguistic phenomena and depending on the languages involved, and the type of code-switching the interaction between the component languages may be quite different. It is easy to identify at least linguistic sharing, cross-lingual transfer, lexical borrowing as well as speech errors with restarts commonly within the code-switched data. Likewise although there may be simple language technology tasks that can be achieved with simple analysis, it is clear that some tasks, such as semantic role labeling will require complex cross-lingual analysis.
Many have identified the notion of a matrix language in code-switching myers2002contact , that there is an underlying language choice which mostly defines the grammar and morphological aspects of the utterance, but it is also clear that the matrix language can change during the utterance. From a language technologies point of view, especially when considering code-switched data generation using any form of language modeling, it is possible to identify 'bad' code-switching or even 'wrong' code-switching. Although it is obviously not a binary decision, there are extremes that will almost always be wrong. We cannot in general randomly choose which language a word would be realized in, or simply state that we will choose alternate languages for each word. That is, there are constraints, there is an underlying grammar and there are multiple linguistic theories that have been proposed for code-switching. Modeling the grammar is going to be hard, even if there may be an eventual standardized Hinglish that everyone in Northern India may speak, at present, such code-switched languages are very dynamic, and will have very diverse ideolects across speakers. This is reminiscent of pidgins and creoles which can develop over time, but they too, especially as they are not normally written languages, are also diverse.
But we should not give up, there is underlying structure, and there are constraints, and we have good machine learning modeling techniques that can deal with uncertainty. Recently, there has been quite a lot of interest in the speech and NLP community on processing code-switched speech and text, and this paper aims at describing progress made in the field, and discussing open problems.
This survey is organized as follows. First, we introduce why code-switching is a challenging and important problem for speech and NLP. Next, in Section 2, we briefly describe linguistic studies on code-switching with other theoretical aspects. In Section 3 we describe speech and NLP corpora and resources that have been created for code-switched language pairs. Section 4 describes approaches to handling code-switching in specific speech and NLP applications. We conclude in Section 5 with a description of the challenges that remain to be addressed and future directions.
Research on code-switching is not recent, and this phenomenon has been studied by linguists for decades. As mentioned earlier, code-switching is not a random juxtaposition of the two languages being mixed. In this section, we provide a description of linguistic studies on code-switching and how to characterize code-switched languages. We do not attempt to be comprehensive, since code-switching has been studied by linguists for decades and providing a complete description of their research is out of the scope of this paper.
2.1 Types of code-switching
Code-switching is defined as the 'juxtaposition within the same speech exchange of passages of speech belonging to two different grammatical systems or sub-systems' gumperz1982discourse , while code-mixing is 'the embedding of linguistic units such as phrases, words and morphemes of one language into an utterance of another language' myers1997duelling . The distinction between code-switching, mixing and lexical borrowing is often not clear and can be thought of as lying on a continuum bali2014borrowing . In this paper, we use the terms 'code-switching' and 'code-mixing' interchangeably, although the distinction between the two may be important for certain applications.
The extent and type of code-switching can vary across language pairs. rijhwani2017estimating used word-level Language Identification to estimate which language pairs were code-switched on Twitter. They found that around 3.5% of tweets were code-switched, with the most common pairs being English-Spanish, English-French and English-Portuguese. English-German tweets typically had only one switch point, implying that the tweets usually contained translations of the same content in English and German, while English-Turkish tweets had the most switch points, implying fluid switching between the two languages. Code-switching can also vary within a language pair. For example, casual conversational Hinglish may be different from Hinglish used in Bollywood movies, which may be different from Hinglish seen on Twitter.
2.2 Linguistic Models of Code-switching
Early approaches investigate code-switching by laying down a formal framework taking into account the two grammatical systems of the languages being mixed and a mechanism to switch between these two systems at the intra-sentential level joshi1982processing . This model mainly explores asymmetric relations between the two grammars, without an explicit formalism of a third grammar and the understanding of where and how to switch closed class items.
Quantitative analysis conducted by poplack1978syntactic revealed two constraints (1) Free Morpheme Constraint and (2) Equivalence Constraint that function simultaneously. The Free Morpheme constraint specifies that it is possible to switch between full sentences as well as any constituent within the sentence if a free morpheme is present in a constituent. The Equivalence Constraint specifies that language switches generally occur at points where there is no violation of syntactic rules of the participating languages.
poplack1980sometimes worked on incorporating both linguistic and extra-linguistic factors into a single analytical model. This study concludes that there are no visibly ungrammatical combinations of the two languages and code-switching is independent of the bilingual ability of the speaker. sankoff1998formal showed that there exists a constituent tree labeling, implying that around a switch point there is a constraint on an equivalence order in constituents. The above described linguistic theories are also used in di1986government to identify governing relationships between constituents. belazi1994code have demonstrated evidence that a constrained Universal Grammar needs refinement of f-selection in code-switching as compared to monolingual speech. sebba1998congruence have proposed four categories for any switch point comprising of harmonization, neutralization, compromise, and blocking.
gardner2004assumptions have a rather interesting approach towards analyzing grammatical variants in code-switching based on pre-conceptualized assumptions. They claim that grammar in this context is subject to poly-idiolectal repertoires of bilingual speakers and sociolinguistic factors take precedence over grammatical factors. Hence they propose accounting for variability among the bilingual speakers. This same work was extended later to examine intra-sentential switching focusing on bilingual compound verbs and using grammatical knowledge.
The linguistic theories mentioned above were put to use in computational frameworks by bhat2016grammatical . They address several issues such as the absence of literal level translation pairs, sensitivity to minor alignment errors and the under specification of the original models. The human evaluation of generated sentences reveals that the acceptability of code-switching patterns depend not only on socio-linguistic factors but also cognitive factors. This work was later extended in pratapa2018language to perform language modeling by leveraging the theories discussed above to generate synthetic code-switched text.
While on one hand, there are studies of formally constructing grammatical representations to understand the nature of code-switching, there is also work that focuses on understanding the psycho-linguistic aspect of this subject pertaining to how and when this occurs. There are studies pertaining to socially determined and pragmatic choices in the developmental perspective of switching in bilingual infants lanvers2001language . Another stream of work talks about the factors triggering code-switching that are attributed to 'cognate' or trigger words including proper nouns, cognate content words with good and moderate form overlap, and cognate function words. backus2005codeswitching have studied attested contact-induced changes based on prior linguistic theories regarding the types of structural changes in calques, distributions, frequencies, inventory and stability.
2.3 Measuring the amount of code-switching
Various metrics have been proposed to measure the amount of code-switching in corpora. The Code-mixing Index (CMI) gamback2016comparing is an utterance and corpus level metric proposed to measure the amount of code-switching in corpora by using word frequencies. barnett2000lides propose M-Index which quantifies the ratio of languages in the corpora based on the Gini coefficient to measure the inequality of the distribution of languages in the corpus. guzman2017metrics extend this metric to describe the probability of switching within a corpus by summing up the probabilities that there has been a language switch. This metric is termed Integration Index ( I-Index) and has values of in the range from 0 (a monolingual text in which no switching occurs) to 1.
guzman2017metrics also propose the following metrics: Language Entropy, Span Entropy, Burstiness and Memory. Language Entropy and Span Entropy are the number of bits needed to represent the distribution of language spans. Burstiness quantifies whether the switching has periodic character or occurs in bursts. Memory captures the tendency of consecutive language spans to be positively or negatively autocorrelated adithyaicon .
3 Data and resources
Over the last few years, significant progress has been made in the fields of Speech Processing and Natural Language Processing mainly owing to the use of large and powerful Machine Learning models such as Deep Neural Networks (DNNs). DNNs typically require large labeled corpora for training, which can be found for a few languages such as US English, Mandarin and Modern Standard Arabic, which are commonly termed as high-resource languages. In the presence of large datasets, models can be trained to achieve high accuracies on tasks such as Automatic Speech Recognition, Machine Translation and Parsing.
However, most languages in the world do not have the necessary data and resources to create models with high enough accuracies to be used in real-world systems. The situation is even more stark for code-switched languages, since considerable care is taken to leave out foreign words while building monolingual resources. So, even if monolingual resources exist for one or more of the languages being mixed, code-switched speech and language resources are very scarce.
However, owing to the recent interest in code-switched speech and language processing, there are some speech and text data sets available for a few language pairs, which we describe next.
3.1 Speech data
Data used for building Automatic Speech Recognition (ASR) and Text to Speech (TTS) systems typically consists of recorded speech and the corresponding transcripts. For ASR systems, the speech may be spontaneous or read, and typically needs to be at least a few thousand hours to build systems that are usable. For TTS systems, a few hours of clean, well recorded speech from a single speaker is typically enough. Below is a list of code-switched data sets available for speech processing.
SEAME lyu2010seame is a corpus of Mandarin-English code-switching by bilinguals in Singapore and Malaysia, with Mandarin being the dominant language in the recordings. It consists of 63 hours of interviews and conversational speech from 97 speakers.
The HKUST Mandarin-English Corpus li2012mandarin also consists of interviews and conversational speech with 5 hours of transcribed and 15 hours of untranscribed speech.
The CECOS corpus shen2011cecos contains 12 hours of prompted Mandarin-English speech from 77 speakers.
The CUMIX Cantonese-English speech corpus chan2005development contains 17 hours of code-switched speech read by 80 speakers.
A Mandarin-Taiwanese corpus is described in lyu2006speech containing 4000 utterances recorded by 16 speakers.
BANGOR-MIAMI deuchar2014building is a Spanish-English code-switched corpus consisting of 56 audio recordings and their corresponding transcripts. The recordings consist of informal conversations between two or more speakers, involving a total of 84 speakers.
A small Spanish-English corpus consisting of 40 minutes of spontaneous speech is described in franco2007baby .
ramanarayanan2017jee describe an audio and video corpus of elicited code-switched Spanish-English and Hindi-English dialogues. The corpus consists of over 700 calls to an automated agent by workers on Amazon Mechanical Turk, although only a small subset of these have been transcribed.
The MSR Hindi-English database sivasankaran2018phone consists of 50 hours of conversational speech between Hindi-English bilinguals. There are around 500 speakers in the corpus.
sreeram2018hindi crawled blogs to collect Hindi-English code-switched utterances. 71 speakers recorded around 7000 utterances which were then transcribed and used to build an ASR system.
pandey2017adapting describe the creation of a phonetically balanced Hindi-English corpus for code-switched ASR. This corpus contains read speech from 78 speakers, with each speaker having recorded around a minute of speech. The prompts have been collected from news websites and sampled for phonetic coverage.
dey2014hindi collected a small Hindi-English corpus of student interviews. The corpus contains 3 minutes of transcribed speech from 9 speakers.
ahmed2012automatic collected 1000 hours of Malay-English speech from 208 Chinese, Malay and Indian speakers.
An Egyptian Arabic-English speech corpus is described in hamed2018collection . It consists of 5.3 hours of speech from interviews with 12 participants, of which 4.5 hours of speech has been transcribed.
The MCSM database (Maghrebian Code-switching in Media) mohdeb2016arabic consists of broadcasts from Morocco, Algeria and Tunisia with varying amounts of code-switching between French and Arabic. The FACST corpus (French Arabic Code-switching Triggered) amazouz2018french consists of 7.3 hours of French-Algerian Arabic code-switched speech from 20 bilingual speakers.
yilmaz2017longitudinal describe a corpus of radio broadcasts in Frisian covering a 50 year time span containing code-switching with Dutch. The corpus consists of 18.5 hours of speech annotated with speaker information, dialect and code-switching details and the presence of background noise/music.
A corpus of code-switched isiZulu-English consisting of transcribed speech from soap operas is described in van2016automatic . It contains around 16 hours of transcribed speech with code-switching boundary annotations. This corpus is extended in yilmaz2018building to also include 14 hours of English-isiXhosa, English-Setswana, and English-Sesotho code-switched speech.
For Sepedi-English, two code-switching speech corpora are available modipa2013implications . The Sepedi Radio corpus consists of broadcast speech which has been used for analyzing code-switching in this language pair. The Sepedi Prompted Speech Corpus consists of 10 hours of speech from 20 speakers.
Although no code-switched speech databases exist for Speech Synthesis, bilingual TTS databases are available from the same speakers in a number of Indian languages and English baby2016resources .
3.2 Text data
In this section, we describe various resources that exist for processing code-switched text. Since the type of data and resources vary greatly with the task at hand, we describe them separately for each task.
3.2.1 Question Answering (QA)
Question answering (QA) datasets typically consist of questions and answers that are in the form of articles, images, tuples etc. In case of code-switched QA, the questions are typically in code-switched form.
A first step towards creating a code-switched QA dataset was attempted by collecting 3000 questions from a version of a TV show "Who wants to be a Millionaire?" and general knowledge questions from primary school textbooks for Hindi-English code-switching questions raghavianswer . Out of the 3000 questions, 1000 unique questions are used in order to avoid any individual biases of language usage.
In lieu of addressing the possibility of lexical bias from entrainment in raghavianswer , another effort was made on a larger scale to collect 5933 questions for Hindi-English, Tamil-English, Telugu-English grounded on articles and images chandu2018code .
Another section of efforts that move towards using monolingual data from English and weakly supervised and imperfect bilingual embeddings provided a test set of 250 Hindi-English code-switched questions mapped between SimpleQuestions dataset and Freebase tuples gupta2018transliteration .
One of the early efforts also include leveraging around 300 messages from social media platforms like Twitter and blogs to collect 506 questions from the domains of sports and tourism banerjeefirst .
3.2.2 Language Identification (LID)
Language ID data sets consist of code-switched sentences that are labeled at the word-level with language information. Conventional LID systems operate at the sentence or document level, which leads to the requirement of word-level LID for code-switched sentences.
A couple of shared tasks played an important role in establishing datasets for language identification solorio2014overview sequieraoverview .
A predetermined set of 11 users of Facebook users were selected to search for publicly available content that resulted in 2335 posts and 9813 comments barman2014code . Two levels of annotations were performed on this data comprising of different levels of code-switching and language tags including English, Bengali, Hindi, Mixed, Universal and Undefined. A similar approach is also followed by das2014identifying to collect more data from Bengali, Hindi and English with finer annotation schema catering to named entities and also explicitly annotating suffixes.
patro2017all used a two step process by crawling tweets related to 28 hashtags comprising of contexts ranging from sports, movies, religion, politics etc, that resulted in 811981 tweets. Identifying 3577 users from these tags, tweets from these users are crawled in order to gather more mixed language thus resulting in 725173 distinct tweets written in Roman script. These tweets are annotated with English, Hindi and Other tags.
Another very large scale dataset that is is not explicitly targeted at code-switching but contains it is jurgens2017incorporating that addresses curating socially representative text by caring about geographic, social, topical and multilingual diversity. This corpus consists of Tweets from 197 countries in 53 languages.
3.2.3 Named Entity Recognition (NER)
Named Entity Recognition (NER) datasets for code-switching are similar to LID datasets, with word-level annotations.
A shared task was organized to address NER for code-switched texts using around 50k Spanish-English and around 10k Arabic-English annotated tweets aguilar2018named .
Twitter is a commonly used source of code-switched data. singh2018named annotated 3,638 tweets with three Named Entity tags 'Person', 'Organization' and 'Location' using the BIO scheme.
3.2.4 Part of Speech (POS) Tagging
POS tagging data sets consist of code-switched sentences tagged at the word level with POS information.
Public pages from Facebook pages of three celebrities and the BBC Hindi news page are used to gather 6,983 posts and comments and annotated with POS tags in addition to matrix language information vyas2014pos .
Code-switched Turkish-German tweets were annotated based on Universal Dependencies POS tags and the authors proposed guidelines for the Turkish parts to adopt language-general heuristics to gather a corpus of 1029 tweets ccetinouglu2016part .
922 sentences of spoken Spanish-English conversational data is transcribed and annotated with POS tags in solorio2008part .
jamatia2015part gathered 1106 messages (552 Facebook posts and 554 tweets) in Hindi-English and annotated them with a Twitter specific tagset. jamatia2016collecting describe an English-Bengali corpus consisting of Twitter messages and two English-Hindi corpora consisting of Twitter and Facebook messages tagged with coarse and fine grained POS tags.
soto2017crowdsourcing crowd-sourced POS tags using the Universal POS tagset to annotate the BANGOR-MIAMI corpus which is a conversational speech dataset with Spanish-English code-switching.
3.2.5 Parsing
Datasets for parsing contain code-switched sentences with dependency parses and chunking tags.
partanen2018dependency have worked on using monolingual resources to parse low resource languages in the presence of code-switching. While the training data comprises of Russian UD v2.0 corpus with 3,850 sentences and 40 Komi sentences, the test set comprises of 80 Komi-Russian multilingual sentences and 25 Komi spoken sentences.
bhat2017joining have presented a dataset of 450 Hindi-English CM tweets for evaluation purposes annotated with dependency parse relations.
A shallow parsing dataset comprising of 8450 tweets annotated with language id, normalized script, POS tagset and chunking tags is described in sharma2016shallow .
Code-switched test utterances for the NLmaps corpus are constructed by duong2017multilingual . They use a parallel corpus of English and German utterances which share the same logical form to construct code-switched utterances. They use 1500 pairs of sentences from each language for training and 880 pairs for testing.
3.3 Information retrieval
chakma2016cmir collected 1959 Hindi-English tweets and asked annotators to rank tweets according to relevance for specific queries.
4 Code-switched Speech and NLP
thara2018code present a brief survey of code-switching studies in NLP. In this paper, we provide a comprehensive description of work done in code-switched speech and NLP. Various approaches have been taken to build speech and NLP systems for code-switched languages depending on the availability of monolingual, bilingual and code-switched data. When there is a complete lack of code-switched data and resources, a few attempts have been made to build models using only monolingual resources from the two languages being mixed.
Domain adaptation or transfer learning techniques can be used, wherein models are built on monolingual data and resources in the two languages and a small amount of 'in-domain' code-switched data can be used to tune the models.
Word embeddings have been used recently for a wide variety of NLP tasks. Code-switched embeddings can be created using code-switched corpora adithya2018 , however, in practice such resources are not available and other techniques such as synthesizing code-switched data for training such embeddings can be used.
4.1 Automatic Speech Recognition
Since code-switching is a spoken language phenomenon, it is important that Automatic Speech Recognizers (ASRs) that are deployed in multilingual communities are able to handle code-switching. In addition, ASR systems tend to be the first step in a pipeline of different systems in applications such as conversational agents, so any errors made by ASR systems can propagate through the system and lead to failures in interactions.
Attempts have been made to approach the problem of code-switched ASR from the acoustic, language and pronunciation modeling perspectives.
Initial attempts at handling code-switched speech recognition identified the language being spoken by using a Language Identification (LID) system and then used the appropriate monolingual decoder for recognition. One approach is to identify the language boundaries and subsequently use an monolingual ASR system to recognize monolingual fragments chan2004detection . Another approach runs multiple recognizers in parallel with an LID system and uses scores from all the systems for decoding speech weiner2012integration . In ahmed2012automatic , no LID system is used - instead, two recognizers in English and Malay are run in parallel and the hypotheses produced are re-scored to get the final code-switched recognition result. However, the disadvantages with multi-pass approaches are that errors made by the LID system are not possible to recover from. lyu2006speech suggest a single-pass approach with soft decisions on LID and language boundary detection for Mandarin-Taiwanese ASR.
The choice of phone set is important in building ASR systems and for code-switched language pairs, the choice of phoneset is not always obvious, since one language can have an influence on the pronunciation of the other language. chan2009automatic develop a cross-lingual phonetic Acoustic Model for Cantonese-English speech, with the phone set designed based on linguistic knowledge. yu2003chinese present three approaches for Mandarin-English ASR - combining the two phone inventories, using IPA mappings to construct a bilingual phone set and clustering phones by using the Bhattacharyya distance and acoustic likelihood. The clustering approach outperforms the IPA-based mapping and is comparable to the combination of the phone inventories. sivasankaran2018phone describe approaches to combine phone sets, merge phones manually using knowledge and iterative merging using ASR errors on Hindi-English speech. Although the automatic approach is promising, manual merging using expert knowledge from a bilingual speaker performs best. vu2012first use IPA, Bhattacharya distance and discriminative training to combine phone sets for Mandarin-English. When code-switching occurs between closely related languages, the phone set of one language can be extended to cover the other, as is suggested in lyudovyk2014code for Ukranian-Russian ASR. In this work, the Ukranian phone set and lexicon are extended to cover Russian words using phonetic knowledge about both languages.
modipa2013implications describe an ASR system for Sepedi-English in which a single Sepedi lexicon is used for decoding. English pronunciations in terms of the Sepedi phone set are obtained by phone-decoding English words with the Sepedi ASR. pandey2017adapting use a common Wx-based phone set for Hindi-English ASR built using a large amount of monolingual Hindi data with a small amount of code-switched Hindi-English data. yeh2015improved use cross-lingual data sharing to tackle the problem of highly imbalanced Mandarin-English code-switching, where the speakers speak primarily in Mandarin.
When data from both languages is available but there is no or very little data in code-switched form, bilingual models can be built. vu2012first train the Acoustic Model on bilingual data, while bhuvanagiri2010approach and bhuvanagirir2012mixed use existing monolingual models and with a phone-mapped lexicon and modified Language Model for Hindi-English ASR.
yilmaz2016investigating build a bilingual DNN-based ASR system for Frisian-Dutch broadcast speech using both language-dependent and independent phones. The language dependent approach, where each phone is tagged with the language and modeled separately performs better. yilmaz2017exploiting decode untranscribed data with this ASR system and add the decoded speech to ASR training data after rescoring using Language Models. In yilmaz2018acoustic , this ASR is significantly improved with augmented textual and acoustic data by adding more monolingual data in Dutch, automatically transcribing untranscribed data, generating code-switched data using Recurrent LMs and machine translation.
yilmaz2018building build a unified ASR system for five South African languages, by using interpolated language models from English-isiZulu, English-isiXhosa, English-Setswana and English-Sesotho. This system is capable of recognizing code-switched speech in any of the five language combinations.
guo2018study use semi-supervised techniques to improve the lexicon, acoustic model and language model of English-Mandarin code-switched ASR. They modify the lexicon to deal with accents and treat utterances that the ASR system performs poorly on as unsupervised data.
Recent studies have explored end-to-end ASR for code-switching. Traditional end-to-end ASR models require a large amount of training data, which is difficult to find for code-switched speech. winata2018towards propose a CTC-based model for Mandarin-English speech, in which the model is first trained using monolingual data and then fine-tuned on code-switched data. shaninvestigating use transfer learning from monolingual models, wordpieces as opposed to graphemes and multitask learning with language identification as an additional task for Mandarin-English end-to-end ASR.
As stated earlier, switching/mixing and borrowing are not always clearly distinguishable. Due to this, the transcription of code-switched and borrowed words is often not standardized, and can lead to the presence of words being cross-transcribed in both languages. brij2018 automatically identify and disambiguate homophones in code-switched data to improve recognition of code-switched Hindi-English speech.
4.2 Language Modeling
Language models (LMs) are used in a variety of Speech and NLP systems, most notably in ASR and Machine Translation. Although there is significantly more code-switched text data compared to speech data in the form of informal conversational data such as on Twitter, Facebook and Internet forums, robust language models typically require millions of sentences to build. Code-switched text data found on the Internet may not follow exactly the same patterns as code-switched speech. This makes building LMs for code-switched languages challenging.
Monolingual data in the languages being mixed may be available, and some approaches use only monolingual data in the languages being mixed weng1997study while others use large amounts of monolingual data with a small amount of code-switched data.
Other approaches have used grammatical constraints imposed by theories of code-switching to constrain search paths in language models built using artificially generated data. li2012code use inversion constraints to predict CS points and integrate this prediction into the ASR decoding process. li2014code integrate Functional Head constraints (FHC) for code-switching into the Language Model for Mandarin-English speech recognition. This work uses parsing techniques to restrict the lattice paths during decoding of speech to those permissible under the FHC theory. li2013language assign weights to parallel sentences to build a code-switched translation model that is used with a language model for decoding code-switched Mandarin-English speech.
ashutosh2017 show that a training curriculum where an Recurrent Neural Network (RNN) LM is trained first with interleaved monolingual data in both languages followed by code-switched data gives the best results for English-Spanish LM. adithya2018 extend this work by using grammatical models of code-switching to generate artificial code-switched data and using a small amount of real code-switched data to sample from the artificially generated data to build Language Models.
gebhardt2011speech uses Factored Language Models for rescoring n-best lists during ASR decoding. The factors used include POS tags, code-switching point probability and LID. In adel2013recurrent , adel2013combination and adel2014features , RNNLMs are combined with n-gram based models, or converted to backoff models, giving improvements in perplexity and mixed error rate. van2017synthesising synthesize isiZulu-English bigrams using word embeddings and use them to augment training data for LMs, which leads to a reduction in perplexity when tested on a corpus of soap opera speech.
4.3 code-switching detection from speech
As mentioned earlier, some ASR systems first try to detect the language being spoken and then use the appropriate model to decode speech. In case of intra-sentential switching, it may be useful to be able to detect the code-switching style of a particular utterance, and be able to adapt to that style through specialized language models or other adaptation techniques.
rallabandi2017building look at the problem of language detection from code-switched speech and classify code-switched corpora by code-switching style and show that features extracted from acoustics alone can distinguish between different kinds of code-switching in a single language.
4.4 Speech Synthesis
Currently, Text to Speech (TTS) systems assume that the input is in a single language and that it is written in native script. However, due to the rise in globalization, phenomenon such as code-switching are now seen in various types of text ranging from news articles through comments/posts on social media, leading to co-existence of multiple languages in the same sentence. Incidentally, these typically are the scenarios where TTS systems are widely deployed as speech interfaces and therefore these systems should be able to handle such input. Even though independent monolingual synthesizers today are of very high quality, they are not fully capable of effectively handling such mixed content that they encounter when deployed. These synthesizers in such cases speak out the wrong/accented version at best or completely leave the words from the other language out at worst. Considering that the words from other language(s) used in such contexts are often the most important content in the message, these systems need to be able to handle this scenario better.
Current approaches handling code-switching fall into three broad categories: phone mapping, multilingual or polyglot synthesis. In phone mapping, the phones of the foreign language are substituted with the closest sounding phones of the primary language, often resulting in strongly accented speech. In a multilingual setting, each text portion in a different language is synthesised by a corresponding monolingual TTS system. This typically means that the different languages will have different voices unless each of the voices is trained on the voice of same multilingual speaker. Even if we have access to bilingual databases, care needs to be taken to ensure that the recording conditions of the two databases are very similar. The polyglot solution refers to the case where a single system is trained using data from a multilingual speaker. Similar approaches to dealing with code-switching have been focused on assimilation at the linguistic level, and advocate applying a foreign linguistic model to a monolingual TTS system. The linguistic model might include text analysis and normalisation, a G2P module and a mapping between the phone set of the foreign language and the primary language of the TTS system tomokiyo2005foreign ; campbell2001talking ; badino2004language . Other approaches utilise cross-language voice conversion techniques mashimo2001evaluation and adaptation on a combination of data from multiple languages latorre2005polyglot . Assimilation at the linguistic level is fairly successful for phonetically similar languages badino2004language , and the resulting foreign synthesized speech was found to be more intelligible compared to an unmodified non-native monolingual system but still retains a degree of accent of the primary language. This might in part be attributed to the non-exact correspondence between individual phone sets.
sitaram2015experiments find from subjective experiments that listeners have a strong preference for cross-lingual systems with Hindi as the target language. However, in practice, this method results in a strong foreign accent while synthesizing the English words. elluru2013word ; rallabandi2015iiit propose a method to use a word to phone mapping instead, where an English word is statistically mapped to Indian language phones.
4.5 Language Identification
The task of lexical level language identification (LID) is one of the skeletal tasks for the lexical level modeling of downstream NLP tasks. A large amount of research in this area has been conducted due to shared tasks on word-level LID ( solorio2014overview , sequieraoverview ). Social media data, especially posts from Facebook was used to collect data for the task of LID barman2014code of Bengali, Hindi and English code-switching. Techniques include dictionary based lookup, supervised techniques applied at word level along with ablation studies of contextual cues and CRF based sequence labeling approaches. Character level n-gram features and contextual information are found to be useful as features.
chittaranjan2014word is among the first computational approaches towards determining intra-word switching by segmenting the words into smaller meaningful units through morphological segmentation and then performing language identification probabilistically. jhamtani2014word make use of patterns in language usage of Hinglish along with the consecutive POS tags for LID. das2014identifying have also experimented with n-gram modeling with pruning and SVM based models with feature ablations Hindi-English and Bengali-English LID. patro2017all have worked on re-defining and re-annotating language tags from social media cues based on cultural, core and therapeutic borrowings. jurgens2017incorporating have introduced a socially equitable LID system known as EQUILID by explicitly modeling switching with character level sequence to sequence models to encompass dialectal variability in addition to code-switching. king2013labeling present a weakly supervised approach with a CRF based on a generalization expectation criteria that outperformed HMM, Maximum Entropy and Naive Bayes methods by considering this a sequence labeling task.
4.6 Named Entity Recognition
Another sequence labeling task of interest is Named Entity Recognition (NER). aguilar2018named organized a shared task on NER in code-switching by collecting data from tweets for Spanish-English and Arabic-English. attia2018ghht augmented state-of-the-art character level Convolutional Neural Networks (CNNs) with Bi-LSTMs followed by a CRF layer, by enriching resources from external sources by stacking layers of pre-trained embeddings, Brown clusters and gazetteer lists. geetha2018tackling attempted to build models from observations from data comprising of less than 3% of surface level Named Entities and a high Out of Vocabulary (OOV) percentage. To address these issues they rely on character based BiLSTM models and leveraging external resources. Prior to this shared task, aguilar2017multi posed this task as a multi-task learning problem by using a character level CNNs to model non-standard spelling variations followed by a word level Bi-LSTM to model sequences. This work also highlights the importance of gazetteer lists since it is similar to a low resource setting.
zirikly2015named studied Arabic text on social media by exploring the influence of word embedding based representations on NER. Along similar lines, zea2016spanish also investigated how word representations are capable of boosting semi-supervised approaches to NER. singh2018named collected tweets from topics like politics, social events, sports and annotated them with three Named Entity Tags in the BIO scheme and explored CRF, LSTM and Decision Tree methods. Formal and informal language specific features were leveraged to employ Conditional Random Fields, Margin Infused Relaxed Algorithm, Support Vector Machines and Maximum Entropy Markov Models to perform NER on informal text in Twitter etter2013nerit .
4.7 POS Tagging
Recently there has been interest in code-switched structured prediction tasks like POS tagging and parsing. vyas2014pos used a dual mechanism of utilizing both a CRF++ based tagger and a Twitter POS tagger in order to tag sequences of mixed language. The same work also proposed a dataset that is obtained from Facebook that is annotated at a multi-level for the tasks of LID, text normalization, back transliteration and POS tagging. They claim that joint modeling of all these tasks is expected to yield better results. ccetinouglu2016part presented POS annotation for Turkish-German tweets that align with existing language identification based on POS tags from Universal Dependencies. solorio2008part explored the exploitation of monolingual resources such as taggers (for Spanish and English data) and heuristic based approaches in conjunction with machine learning techniques such as SVM, Logit Boost, Naive Bayes and J48. This work shows that many errors occur in the presence of intra-sentential switching thus establishing the complexity of the task.
jamatia2015part have also gathered data from social media platforms such as Facebook and Twitter and have annotated them at coarse and fine grained levels. They focus on comparing language specific taggers with ML based approaches including CRFs, Sequential Minimal Optimization, Naive Bayes and Random Forests and observ that Random Forests performed the best, although only marginally better than combinations of individual language taggers. soto2017crowdsourcing use crowd-sourcing for annotating universal POS labels for Spanish-English speech data by splitting the task into three subtasks. These are 1. labeling a subset of tokens automatically 2. disambiguating a subset of high frequency words 3. crowd-sourcing tags by decisions based on questions in the form of a decision tree structure. The choice of mode of tagging is based on a curated list of words.
4.8 Parsing
goyal2003bilingual worked on bilingual syntactic parsing techniques for Hindi-English code-switching using head-driven phrase structure grammar. The parses in cases of ambiguities are ordered based on ontological derivations from WordNet through a Word Sense Disambiguator sharma2002saarthaka . However, there is an assumed external constraint in this work, where the head of the phrase determines the syntactic properties of the subcategorized elements irrespective of the languages to which these words belong.
bhat2017joining leveraged a non-linear neural approach for the task of predicting the transitions for the parser configurations of arc-eager transitions by leveraging only monolingual annotated data by including lexical features from pre-trained word representations. sharma2016shallow also worked on a pipeline and annotating data for shallow parsing by labeling three individual sequence labeling tasks based on labels, boundaries and combination tasks where a CRF is trained for each of these tasks.
duong2017multilingual performed multilingual semantic parsing using a transfer learning approach for code-switched text utilizing cross lingual word embeddings in a sequence to sequence framework. partanen2018dependency compared different systems for dependency parsing and concluded that the Multilingual BIST parser is able to parse code-switched data relatively well.
4.9 Question Answering
So far, we have seen individual speech and NLP applications which can be used as part of other downstream applications. One very impactful downstream application of casual and free mixing beyond mere borrowing in terms of information need is Question Answering (QA). This is especially important in the domains of health and technology where there is a rapid change in vocabulary thereby resulting in rapid variations of usage with mixed languages. One of the initial efforts in eliciting code-mixed data to perform question classification was undertaken by raghavianswer . This work leveraged monolingual English questions from websites for school level science and maths, and from Indian version of the show 'Who wants to be a Millionaire?'. Crowd-workers are asked to translate these questions into mixed language in terms of how they would frame this question to a friend next to them.
Lexical level language identification, transliteration, translation and adjacency features are used to build an SVM based Question Classification model for data annotated based on coarse grained ontology proposed by li2002learning . Since this mode of data collection has the advantage of gathering parallel corpus of English questions with their corresponding code-switched questions, there is a possibility of lexical bias due to entrainment. In order to combat this, chandu2018code discussed techniques to crowd-source code-mixed questions based on a couple of sources comprising of code-mixed blog articles and based on certain fulcrum images. They organized the first edition of the code-mixed question answering challenge where the participants used techniques based on Deep Semantic Similarity model for retrieval and pre-trained DrQA model fine-tuned on the training dataset. An end-to-end web based QA system WebShodh is built and hosted by chandu2017webshodh which also has an additional advantage of collecting more data.
gupta2018transliteration trained TripletSiamese-Hybrid CNN to re-rank candidate answers that are trained on the SimpleQuestions dataset in monolingual English as well as with loosely translated code-mixed questions in English thereby eliminating the need to actually perform full fledged translation to answer queries. banerjeefirst gathered a QA dataset from Facebook messages for Bengali-English CM domain. In addition to this line of work, there were efforts for developing a cross-lingual QA system where questions are asked in one language (English) and the answer is provided in English but the candidate answers are searched in Hindi newspapers sekine2003hindi .
pingali2008dictionary presented a query oriented multi-document summarization system for Telugu-English with a dictionary based approach for cross language query expansion using bilingual lexical resources. Cross language QA systems are explored in European languages as well neumanncross , magninimultiple .
4.10 Machine Translation
sinha2005machine developed a machine translation scheme for translating Hinglish into pure English and pure Hindi forms by performing cross morphological analysis. johnson2017google show that a zero shot Neural Machine Translation system can also deal with code-switched inputs, however, the results are not as good as monolingual inputs.
4.11 Dialogue and discourse
rao2018study study lexical and prosodic features of code-switched Hindi-English dialogue and find that the embedded language (English) fragments are spoken more slowly and with more vocal effort, and pitch variation is higher in the code-switched portion of the dialogues compared to the monolingual parts.
bawa2018accommodation treat code-choice as linguistic style and study accommodation across turns in dialogues in Spanish-English and Hindi-English. They find that accommodation is affected by the markedness of the languages in context and is sometimes seen after a few turns, leading to delayed accommodation.
Cross-lingual Question Answering systems were extended to dialog systems for railway inquiries reddy2006dialogue . Recently, there has been an attempt to create code-mixed version of goal oriented conversations banerjee2018dataset from the DSTC2 restaurant reservation dataset.
It is clear from the description of the tools and language processing applications above that while there has been a lot of work on individual Speech and NLP systems for code-switching, there are no end-to-end systems that can interact in code-switched language with multilingual humans. This is partly due to lack of data for such end-to-end systems, however, a code-switching intelligent agent has to be more than just the sum of parts that can handle code-switching. To build effective systems that can code-switch, we will also have to leverage the work done in psycholinguistics to understand how, when and why to code-switch.
5 Challenges and Future Directions
Although code-switching is a persistent phenomenon through out the whole world, access to data will always be hard. Monolingual corpora will always be easier to find as monolingual discourse is more common in formal environments and hence more likely to be archived. Code-switching data, by its nature of being used in more informal contexts, is less likely to be archived and hence harder to find as training data. Also as code-switching is more likely to be used in less task specific contexts, with less explicit function it may also be harder to label such data.
Most current work in code-switching looks at one particular language pair. It is not yet the case that architectures for multiple pairs are emerging, except perhaps within the Indian sub-continent where there are similar usage patterns with English and various regional languages. However it is clear that not all code-switching is the same. Relative fluency, social prestige, topical restrictions and grammatical constraints have quite different effects on code-switching practices thus it is hard to consider general code-switching models over multiple language pairs.
Also most code-switching studies focus on pairs with one high resource language (e.g. English, Spanish, MSA, Putonghua) and a lower resource language, but realistically the position is much more complex than that. Although we consider Hinglish data low resourced, there are many other Northern Indian languages that are code-switched with Hindi and access to that data is even harder. Thus code-switching studies will inherently always be data starved and our models must therefore expect to work with limited data.
We should also take into the account that as code-switching is more typical in less formal occasions, there are some tasks that are more likely to involve code-switching that others. Thus we are unlikely to encounter programming languages that use code-switching, but we are much more likely to encounter code-switching in sentiment analysis. Likewise analysis of parliamentary transcripts are more likely to be monolingual, while code-switching is much more likely in social media. Of course its not just the forum that affects the distribution, the topic too may be a factor.
These factors of use of code-switch should influence how we consider development of code-switched models. Although it may be possible to build end-to-end systems where large amounts of code-switching data is available, in well-defined task environments, such models will not have the generalizations we need to cover the whole space.
We are not pretending that language technologies for code-switching is a mature field. It is noted that the references to work in this article are for the most part the beginnings of analysis. They are investigating the raw tools that are necessary in order for the development of full systems. Specifically we are not yet seeing full end-to-end digital assistants for code-switched interaction, or sentiment analysis for code-switched reviews, or grammar and spelling for code-switched text. Such systems will come, and they will use the results of the work surveyed here.
It is not yet clear yet from the NLP point of view if code-switching analysis should be treated primarily as a translation problem, or be treated as a new language itself. It is however likely as with many techniques in low-resource language processing, exploiting resources from nearby languages will have an advantage. It is common (though not always) that one language involved in code-switching has significant resources (e.g. English, Putonghua, Modern Standard Arabic). Thus transfer learning approaches are likely to offer short term advantages. Also given the advancement of language technologies developing techniques that can work over multiple pairs of code-switched languages may lead to faster development and generalization of the field.
(1) R. Hickey, The handbook of language contact, John Wiley & Sons, 2012.
(2) P. Auer, A postscript: Code-switching and social identity, Journal of pragmatics 37 (3) (2005) 403–410.
(3) M. Heller, Negotiations of language choice in montreal, Language and social identity (1982) 108–118.
(4) R. Jacobson, Codeswitching Worldwide. II, Vol. 126, Walter de Gruyter, 2011.
(5) A. Camilleri, Language values and identities: Code switching in secondary classrooms in Malta, Linguistics and education 8 (1) (1996) 85–103.
(6) X. Qian, G. Tian, Q. Wang, Codeswitching in the primary efl classroom in china–two case studies, System 37 (4) (2009) 719–730.
(7) E. Rezvani, H. J. Street, A. E. Rasekh, Code-switching in iranian elementary efl classrooms: An exploratory investigation., English language teaching 4 (1) (2011) 18–25.
(8) M. A. Peabody, Methods for pronunciation assessment in computer aided language learning, Ph.D. thesis, Massachusetts Institute of Technology (2011).
(9) S. Antol, A. Agrawal, J. Lu, M. Mitchell, D. Batra, C. Lawrence Zitnick, D. Parikh, Vqa: Visual question answering, in: Proceedings of the IEEE international conference on computer vision, 2015, pp. 2425–2433.
(10) L. Todd, L. Todd, Pidgins and creoles, Routledge, 2003.
(11) J. Arends, P. Muysken, N. Smith, Pidgins and creoles: An introduction, Vol. 15, John Benjamins Publishing, 1995.
(12) M. Sebba, Contact languages: Pidgins and creoles, Macmillan International Higher Education, 1997.
(13) C. Myers-Scotton, Contact linguistics: Bilingual Encounters and Grammatical Outcomes, Oxford University Press on Demand, 2002.
(14) J. J. Gumperz, Discourse strategies, Vol. 1, Cambridge University Press, 1982.
(15) C. Myers-Scotton, Duelling languages: Grammatical structure in codeswitching, Oxford University Press, 1997.
(16) K. Bali, J. Sharma, M. Choudhury, Y. Vyas, " i am borrowing ya mixing?" an analysis of english-hindi code mixing in facebook, in: Proceedings of the First Workshop on Computational Approaches to Code Switching, 2014, pp. 116–126.
(17) S. Rijhwani, R. Sequiera, M. Choudhury, K. Bali, C. S. Maddila, Estimating code-switching on twitter with a novel generalized word-level language detection technique, in: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Vol. 1, 2017, pp. 1971–1982.
(18) A. K. Joshi, Processing of sentences with intra-sentential code-switching, in: Proceedings of the 9th conference on Computational linguistics-Volume 1, Academia Praha, 1982, pp. 145–150.
(19) S. Poplack, Syntactic structure and social function of code-switching, Vol. 2, Centro de Estudios Puertorriqueños,[City University of New York], 1978.
(20) S. Poplack, Sometimes i'll start a sentence in spanish y termino en espanol: toward a typology of code-switching1, Linguistics 18 (7-8) (1980) 581–618.
(21) D. Sankoff, A formal production-based explanation of the facts of code-switching, Bilingualism: language and cognition 1 (1) (1998) 39–50.
(22) A.-M. Di Sciullo, P. Muysken, R. Singh, Government and code-mixing, Journal of linguistics 22 (1) (1986) 1–24.
(23) H. M. Belazi, E. J. Rubin, A. J. Toribio, Code switching and x-bar theory: The functional head constraint, Linguistic inquiry (1994) 221–237.
(24) M. Sebba, A congruence approach to the syntax of codeswitching, International Journal of Bilingualism 2 (1) (1998) 1–19.
(25) P. Gardner-Chloros, M. Edwards, Assumptions behind grammatical approaches to code-switching: When the blueprint is a red herring, Transactions of the Philological Society 102 (1) (2004) 103–129.
(26) G. Bhat, M. Choudhury, K. Bali, Grammatical constraints on intra-sentential code-switching: From theories to working models, arXiv preprint arXiv:1612.04538.
(27) A. Pratapa, G. Bhat, M. Choudhury, S. Sitaram, S. Dandapat, K. Bali, Language modeling for code-mixing: The role of linguistic theory based synthetic data, in: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018.
(28) U. Lanvers, Language Alternation in infant bilinguals: A developmental approach to codeswitching, International Journal of Bilingualism.
(29) A. Backus, Codeswitching and language change: One thing leads to another?, International Journal of Bilingualism 9 (3-4) (2005) 307–340.
(30) B. Gambäck, A. Das, Comparing the Level of Code-Switching in Corpora, in: LREC, 2016.
(31) R. Barnett, E. Codó, E. Eppler, M. Forcadell, P. Gardner-Chloros, R. Van Hout, M. Moyer, M. C. Torras, M. T. Turell, M. Sebba, et al., The LIDES Coding Manual: A Document for Preparing and Analyzing Language Interaction Data Version 1.1, International Journal of Bilingualism 4 (2) (2000) 131–271.
(32) G. Guzmán, J. Ricard, J. Serigos, B. E. Bullock, A. J. Toribio, Metrics for modeling Code-Switching across Corpora, Proc. Interspeech 2017 (2017) 67–71.
(33) A. Pratapa, M. Choudhury, Quantitative Characterization of Code Switching Patterns in Complex Multi-Party Conversations: A case study on Hindi Movie Scripts., in: Proceedings of the 14th International Conference on Natural Language Processing), 2017.
(34) D.-C. Lyu, T.-P. Tan, E. S. Chng, H. Li, Seame: A Mandarin-English Code-Switching Speech Corpus in South-East Asia, in: Eleventh Annual Conference of the International Speech Communication Association, 2010.
(35) Y. Li, Y. Yu, P. Fung, A Mandarin-English Code-Switching Corpus., in: LREC, 2012, pp. 2515–2519.
(36) H.-P. Shen, C.-H. Wu, Y.-T. Yang, C.-S. Hsu, Cecos: A Chinese-English Code-Switching Speech Database, in: Speech Database and Assessments (Oriental COCOSDA), 2011 International Conference on, IEEE, 2011, pp. 120–123.
(37) J. Y. Chan, P. Ching, T. Lee, Development of a Cantonese-English Code-Mixing Speech Corpus, in: Ninth European Conference on Speech Communication and Technology, 2005.
(38) D.-C. Lyu, R.-Y. Lyu, Y.-c. Chiang, C.-N. Hsu, Speech Recognition on Code-Switching among the Chinese Dialects, in: Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on, Vol. 1, IEEE, 2006, pp. I–I.
(39) M. Deuchar, P. Davies, J. Herring, M. C. P. Couto, D. Carter, Building Bilingual Corpora, Advances in the Study of Bilingualism (2014) 93–111.
(40) J. C. Franco, T. Solorio, Baby-steps towards building a Spanglish Language Model, in: International Conference on Intelligent Text Processing and Computational Linguistics, Springer, 2007, pp. 75–84.
(41) V. Ramanarayanan, D. Suendermann-Oeft, Jee haan, I'd like both, por favor: Elicitation of a Code-Switched Corpus of Hindi–English and Spanish–English Human–Machine Dialog, Proc. Interspeech 2017 (2017) 47–51.
(42) S. Sivasankaran, B. M. L. Srivastava, S. Sitaram, K. Bali, M. Choudhury, Phone Merging for Code-Switched Speech Recognition, in: Proceedings of the Third Workshop on Computational Approaches to Linguistic Code-Switching, 2018, pp. 11–19.
(43) G. Sreeram, K. Dhawan, R. Sinha, Hindi-English Code-Switching Speech Corpus, arXiv preprint arXiv:1810.00662.
(44) A. Pandey, B. M. L. Srivastava, S. V. Gangashetty, Adapting Monolingual Resources for Code-Mixed Hindi-English Speech Recognition, in: Asian Language Processing (IALP), 2017 International Conference on, IEEE, 2017, pp. 218–221.
(45) A. Dey, P. Fung, A Hindi-English Code-Switching Corpus., in: LREC, 2014, pp. 2410–2413.
(46) B. H. Ahmed, T.-P. Tan, Automatic Speech Recognition of Code Switching Speech using 1-best Rescoring, in: Asian Language Processing (IALP), 2012 International Conference on, IEEE, 2012, pp. 137–140.
(47) I. Hamed, M. Elmahdy, S. Abdennadher, Collection and Analysis of Code-Switch Egyptian Arabic-English Speech Corpus, in: Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC-2018), 2018.
(48) D. MOHDEB-AMAZOUZ, A.-D. Martine, L. LAMEL, Arabic-French Code-Switching across Maghreb Arabic dialects: A Quantitative Analysis.
(49) D. Amazouz, M. Adda-Decker, L. Lamel, The French-Algerian Code-Switching Triggered Audio Corpus (FACST), in: LREC 2018 11th edition of the Language Resources and Evaluation Conference,, 2018.
(50) E. Yilmaz, J. Dijkstra, H. Velde, H. Heuvel, D. van Leeuwen, Longitudinal Speaker Clustering and Verification Corpus with Code-Switching Frisian-Dutch Speech.
(51) E. van der Westhuizen, T. Niesler, Automatic Speech Recognition of English-isizulu Code-Switched Speech from South African Soap Operas, Procedia Computer Science 81 (2016) 121–127.
(52) E. Yılmaz, A. Biswas, E. van der Westhuizen, F. de Wet, T. Niesler, Building a Unified Code-Switching ASR System for South African Languages, arXiv preprint arXiv:1807.10949.
(53) T. I. Modipa, M. H. Davel, F. De Wet, Implications of Sepedi/English Code Switching for ASR Systems.
(54) A. Baby, A. L. Thomas, H. Myrthy, Resources for Indian Languages, in: Proceedings of Text, Speech and Dialogue, 2016.
(55) K. C. Raghavi, M. Chinnakotla, M. Shrivastava, "Answer ka type kya he?" Learning to Classify Questions in Code-Mixed Language.
(56) K. Chandu, E. Loginova, V. Gupta, J. van Genabith, G. Neuman, M. Chinnakotla, E. Nyberg, A. W. Black, Code-Mixed Question Answering Challenge: Crowd-sourcing Data and Techniques, in: Proceedings of the Third Workshop on Computational Approaches to Linguistic Code-Switching, 2018, pp. 29–38.
(57) V. Gupta, M. Chinnakotla, M. Shrivastava, Transliteration Better than Translation? Answering Code-mixed Questions over a Knowledge Base, in: Proceedings of the Third Workshop on Computational Approaches to Linguistic Code-Switching, 2018, pp. 39–50.
(58) S. Banerjee, S. K. Naskar, P. Rosso, S. Bandyopadhyay, The First Cross-Script Code-Mixed Question Answering Corpus.
(59) T. Solorio, E. Blair, S. Maharjan, S. Bethard, M. Diab, M. Ghoneim, A. Hawwari, F. AlGhamdi, J. Hirschberg, A. Chang, et al., Overview for the first shared task on Language Identification in Code-Switched Data, in: Proceedings of the First Workshop on Computational Approaches to Code Switching, 2014, pp. 62–72.
(60) R. Sequiera, M. Choudhury, P. Gupta, P. Rosso, S. Kumar, S. Banerjee, S. K. Naskar, S. Bandyopadhyay, G. Chittaranjan, A. Das, et al., Overview of FIRE-2015 Shared Task on Mixed Script Information Retrieval.
(61) U. Barman, A. Das, J. Wagner, J. Foster, Code mixing: A challenge for language identification in the language of social media, in: Proceedings of the first workshop on computational approaches to code switching, 2014, pp. 13–23.
(62) A. Das, B. Gambäck, Identifying Languages at the Word level in Code-Mixed Indian Social Media Text.
(63) J. Patro, B. Samanta, S. Singh, A. Basu, P. Mukherjee, M. Choudhury, A. Mukherjee, All that is English may be Hindi: Enhancing Language Identification through Automatic Ranking of the Likeliness of Word Borrowing in Social Media, in: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017, pp. 2264–2274.
(64) D. Jurgens, Y. Tsvetkov, D. Jurafsky, Incorporating Dialectal Variability for Socially Equitable Language Identification, in: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), Vol. 2, 2017, pp. 51–57.
(65) G. Aguilar, F. AlGhamdi, V. Soto, M. Diab, J. Hirschberg, T. Solorio, Named Entity Recognition on Code-Switched Data: Overview of the CALCS 2018 Shared Task, in: Proceedings of the Third Workshop on Computational Approaches to Linguistic Code-Switching, 2018, pp. 138–147.
(66) V. Singh, D. Vijay, S. S. Akhtar, M. Shrivastava, Named Entity Recognition for Hindi-English Code-Mixed Social Media Text, in: Proceedings of the Seventh Named Entities Workshop, 2018, pp. 27–35.
(67) Y. Vyas, S. Gella, J. Sharma, K. Bali, M. Choudhury, POS Tagging of English-Hindi Code-Mixed Social Media Content, in: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), 2014, pp. 974–979.
(68) Ö. Çetinoğlu, Ç. Çöltekin, Part of Speech Annotation of a Turkish-German Code-Switching Corpus, in: Proceedings of the 10th Linguistic Annotation Workshop held in conjunction with ACL 2016 (LAW-X 2016), 2016, pp. 120–130.
(69) T. Solorio, Y. Liu, Part-Of-Speech Tagging for English-Spanish Code-Switched Text, in: Proceedings of the Conference on Empirical Methods in Natural Language Processing, Association for Computational Linguistics, 2008, pp. 1051–1060.
(70) A. Jamatia, B. Gambäck, A. Das, Part-Of-Speech Tagging for Code-Mixed English-Hindi Twitter and Facebook Chat Messages, in: Proceedings of the International Conference Recent Advances in Natural Language Processing, 2015, pp. 239–248.
(71) A. Jamatia, B. Gambäck, A. Das, Collecting and annotating indian social media code-mixed corpora, in: International Conference on Intelligent Text Processing and Computational Linguistics, Springer, 2016, pp. 406–417.
(72) V. Soto, J. Hirschberg, Crowdsourcing universal part-of-speech tags for code-switching.
(73) N. Partanen, K. Lim, M. Rießler, T. Poibeau, Dependency parsing of code-switching data with cross-lingual feature representations, in: Proceedings of the Fourth International Workshop on Computatinal Linguistics of Uralic Languages, 2018, pp. 1–17.
(74) I. Bhat, R. A. Bhat, M. Shrivastava, D. Sharma, Joining hands: Exploiting monolingual treebanks for parsing of code-mixing data, in: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 2, Short Papers, Vol. 2, 2017, pp. 324–330.
(75) A. Sharma, S. Gupta, R. Motlani, P. Bansal, M. Shrivastava, R. Mamidi, D. M. Sharma, Shallow parsing pipeline for hindi-english code-mixed social media text, in: Proceedings of NAACL-HLT, 2016, pp. 1340–1345.
(76) L. Duong, H. Afshar, D. Estival, G. Pink, P. Cohen, M. Johnson, Multilingual semantic parsing and code-switching, in: Proceedings of the 21st Conference on Computational Natural Language Learning (CoNLL 2017), 2017, pp. 379–389.
(77) K. Chakma, A. Das, Cmir: A corpus for evaluation of code mixed information retrieval of hindi-english tweets, Computación y Sistemas 20 (3) (2016) 425–434.
(79) J. Y. Chan, P. Ching, T. Lee, H. M. Meng, Detection of language boundary in code-switching utterances by bi-phone probabilities, in: International Symposium on Chinese Spoken Language Processing, IEEE, 2004.
(80) J. Weiner, N. T. Vu, D. Telaar, F. Metze, T. Schultz, D.-C. Lyu, E.-S. Chng, H. Li, Integration of Language Identification into a recognition system for spoken conversations containing code-switches, in: Spoken Language Technologies for Under-Resourced Languages, 2012.
(81) J. Y. Chan, H. Cao, P. Ching, T. Lee, Automatic recognition of Cantonese-English code-mixing speech, International Journal of Computational Linguistics & Chinese Language Processing, Volume 14, Number 3, September 2009.
(82) S. Yu, S. Hu, S. Zhang, B. Xu, Chinese-English bilingual speech recognition, in: Proceedings of International Conference on Natural Language Processing and Knowledge Engineering, IEEE, 2003.
(83) N. T. Vu, D.-C. Lyu, J. Weiner, D. Telaar, T. Schlippe, F. Blaicher, E.-S. Chng, T. Schultz, H. Li, A first speech recognition system for Mandarin-English code-switch conversational speech, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, 2012.
(84) T. Lyudovyk, V. Pylypenko, Code-switching Speech Recognition for closely related languages, in: Spoken Language Technologies for Under-Resourced Languages, 2014.
(85) C.-F. Yeh, L.-S. Lee, An improved framework for recognizing highly imbalanced bilingual code-switched lectures with Cross-language Acoustic modeling and frame-level language identification, IEEE Transactions on Audio, Speech, and Language Processing(ICASSP) 2015.
(86) K. Bhuvanagiri, S. Kopparapu, An approach to mixed language Automatic Speech Recognition, Oriental COCOSDA, Kathmandu, Nepal, 2010.
(87) K. Bhuvanagirir, S. K. Kopparapu, Mixed language speech recognition without explicit identification of language, American Journal of Signal Processing.
(88) E. Yılmaz, H. van den Heuvel, D. van Leeuwen, Investigating bilingual deep neural networks for automatic recognition of code-switching frisian speech, Procedia Computer Science 81 (2016) 159–166.
(89) E. Yilmaz, H. Heuvel, D. A. van Leeuwen, Exploiting untranscribed broadcast data for improved code-switching detection.
(90) E. Yılmaz, H. v. d. Heuvel, D. A. van Leeuwen, Acoustic and textual data augmentation for improved asr of code-switching speech, arXiv preprint arXiv:1807.10945.
(91) P. Guo, H. Xu, L. Xie, E. S. Chng, Study of semi-supervised approaches to improving english-mandarin code-switching speech recognition, arXiv preprint arXiv:1806.06200.
(92) G. I. Winata, A. Madotto, C.-S. Wu, P. Fung, Towards end-to-end automatic code-switching speech recognition, arXiv preprint arXiv:1810.12620.
(93) C. Shan, C. Weng, G. Wang, D. Su, M. Luo, D. Yu, L. Xie, Investigating end-to-end speech recognition for mandarin-english code-switching.
(94) B. M. L. Srivastava, S. Sitaram, Homophone Identification and Merging for Code-switched Speech Recognition, Proeedings of Interspeech 2018.
(95) F. Weng, H. Bratt, L. Neumeyer, A. Stolcke, A study of multilingual speech recognition, in: Fifth European Conference on Speech Communication and Technology, 1997.
(96) Y. Li, P. Fung, Code-switch language model with inversion constraints for mixed language speech recognition, Proceedings of COLING 2012 (2012) 1671–1680.
(97) Y. Li, P. Fung, Code switch language modeling with functional head constraint, in: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, 2014, pp. 4913–4917.
(98) Y. Li, P. Fung, Language modeling for mixed language speech recognition using weighted phrase extraction., in: Interspeech, 2013, pp. 2599–2603.
(99) A. Baheti, S. Sitaram, M. Choudhury, K. Bali, Curriculum design for code-switching: Experiments with language identification and language modeling with deep neural networks, Proceedings of International Conference on Natural Language Processing (ICON), 2017.
(100) H. Adel, N. T. Vu, F. Kraus, T. Schlippe, H. Li, T. Schultz, Recurrent neural network language modeling for code switching conversational speech, in: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, 2013, pp. 8411–8415.
(101) H. Adel, K. Kirchhoff, D. Telaar, N. T. Vu, T. Schlippe, T. Schultz, Features for factored language models for code-switching speech, in: Spoken Language Technologies for Under-Resourced Languages, 2014.
(102) E. van der Westhuizen, T. Niesler, Synthesising isizulu-english code-switch bigrams using word embeddings., in: INTERSPEECH, 2017, pp. 72–76.
(103) S. Rallabandi, A. W. Black, On building mixed lingual speech synthesis systems, Proceedings of Interspeech.
(104) L. M. Tomokiyo, A. W. Black, K. A. Lenzo, Foreign accents in synthetic speech: Development and Evaluation, in: Ninth European Conference on Speech Communication and Technology, 2005.
(105) N. Campbell, Talking foreign - Concatenative Speech Synthesis and the Language Barrier, in: Seventh European Conference on Speech Communication and Technology, 2001.
(106) L. Badino, C. Barolo, S. Quazza, Language independent phoneme mapping for foreign TTS, in: Fifth ISCA Workshop on Speech Synthesis, 2004.
(107) M. Mashimo, T. Toda, K. Shikano, N. Campbell, Evaluation of cross-language voice conversion based on GMM and STRAIGHT.
(108) J. Latorre, K. Iwano, S. Furui, Polyglot synthesis using a mixture of Monolingual corpora, in: International Conference on Acoustics, Speech, and Signal Processing, 2005. Proceedings(ICASSP), IEEE, 2005.
(109) S. Sitaram, S. K. Rallabandi, S. Black, Experiments with cross-lingual systems for synthesis of Code-Mixed text, in: 9th ISCA Speech Synthesis Workshop, 2017.
(110) N. K. Elluru, A. Vadapalli, R. Elluru, H. Murthy, K. Prahallad, Is word-to-phone mapping better than phone-phone mapping for handling English words?, in: Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013.
(111) S. K. Rallabandi, A. Vadapalli, S. Achanta, S. Gangashetty, IIIT Hyderabad's submission to the Blizzard Challenge 2015, in: Proceedings of Blizzard Challenge 2015, ISCA, 2015.
(112) G. Chittaranjan, Y. Vyas, K. Bali, M. Choudhury, Word level Language Identification using CRF: Code-Switching shared task report of MSR India system, in: Proceedings of The First Workshop on Computational Approaches to Code Switching, 2014, pp. 73–79.
(113) H. Jhamtani, S. K. Bhogi, V. Raychoudhury, Word-level Language Identification in Bi-lingual code-switched texts, in: Proceedings of the 28th Pacific Asia Conference on Language, Information and Computing, 2014.
(114) B. King, S. Abney, Labeling the languages of words in Mixed-Language documents using weakly supervised methods, in: Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2013.
(115) M. Attia, Y. Samih, W. Maier, Ghht at calcs 2018: Named Entity Recognition for Dialectal Arabic using Neural Networks, in: Proceedings of the Third Workshop on Computational Approaches to Linguistic Code-Switching, 2018.
(116) P. Geetha, K. Chandu, A. W. Black, Tackling Code-Switched NER: Participation of CMU, in: Proceedings of the Third Workshop on Computational Approaches to Linguistic Code-Switching, 2018.
(117) G. Aguilar, S. Maharjan, A. P. L. Monroy, T. Solorio, A Multi-task approach for Named Entity Recognition in Social Media data, in: Proceedings of the 3rd Workshop on Noisy User-generated Text, 2017.
(118) A. Zirikly, M. Diab, Named Entity Recognition for Arabic Social Media, in: Proceedings of the 1st Workshop on Vector Space Modeling for Natural Language Processing, 2015.
(119) J. L. C. Zea, J. E. O. Luna, C. Thorne, G. Glavaš, Spanish NER with Word Representations and Conditional Random Fields, in: Proceedings of the Sixth Named Entity Workshop, 2016.
(120) D. Etter, F. Ferraro, R. Cotterell, O. Buzek, B. Van Durme, Nerit: Named Entity Recognition for Informal Text.
(121) P. Goyal, M. R. Mital, A. Mukerjee, A Bilingual Parser for Hindi, English and code-switching structures, in: 10th Conference of The European Chapter, 2003.
(122) D. Sharma, K. Vikram, M. R. Mital, A. Mukerjee, A. M. Raina, Saarthaka- An Integrated Discourse Semantic Model for Bilingual Corpora, in: Proceedings of International Conference on Universal Knowledge and Language, 2002.
(123) X. Li, D. Roth, Learning Question Classifiers, in: Proceedings of the 19th international conference on Computational linguistics-Volume 1, Association for Computational Linguistics, 2002.
(124) K. R. Chandu, M. Chinnakotla, A. W. Black, M. Shrivastava, Webshodh: A Code Mixed Factoid Question Answering System for Web, in: International Conference of the Cross-Language Evaluation Forum for European Languages, Springer, 2017.
(125) S. Sekine, R. Grishman, Hindi-English cross-lingual Question-Answering System, ACM Transactions on Asian Language Information Processing (TALIP) 2003.
(126) P. Pingali, J. Jagarlamudi, V. Varma, A Dictionary based approach with Query Expansion to Cross Language Query based Multi-Document Summarization: Experiments in Telugu-English, Citeseer 2008.
(127) G. Neumann, B. Sacaleanu, A Cross Language Question/Answering System for German and English.
(128) B. Magnini, S. Romagnoli, A. Vallin, J. Herrera, A. Peñas, V. Peinado, F. Verdejo, M. de Rijke, The multiple Language Question Answering Track, 2003.
(129) R. Reddy, N. Reddy, S. Bandyopadhyay, Dialogue based Question Answering System in Telugu, in: Proceedings of the Workshop on Multilingual Question Answering-MLQA, 2006.
(130) S. Banerjee, N. Moghe, S. Arora, M. M. Khapra, A dataset for building code-mixed goal oriented conversation systems, arXiv preprint arXiv:1806.05997.
(131) R. M. K. Sinha, A. Thakur, Machine Translation of Bilingual Hindi-English(Hinglish) Text, 10th Machine Translation summit (MT Summit X), Phuket, Thailand.
(132) M. Johnson, M. Schuster, Q. V. Le, M. Krikun, Y. Wu, Z. Chen, N. Thorat, F. Viégas, M. Wattenberg, G. Corrado, et al., Google's multilingual neural machine translation system: Enabling zero-shot translation, Transactions of the Association for Computational Linguistics 5 (2017) 339–351.
(133) P. Rao, M. Pandya, K. Sabu, K. Kumar, N. Bondale, A study of lexical and prosodic cues to segmentation in a hindi-english code-switched discourse, Proc. Interspeech 2018 (2018) 1918–1922.
(134) A. Bawa, M. Choudhury, K. Bali, Accommodation of conversational code-choice, in: Proceedings of the Third Workshop on Computational Approaches to Linguistic Code-Switching, 2018, pp. 82–91.
Generated on Sun Jun 16 22:17:38 2019 by LaTeXML | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 4,279 | [
128000,
32,
24507,
315,
6247,
48296,
291,
39841,
323,
11688,
29225,
198,
31192,
352,
3444,
29508,
640,
11,
735,
8671,
67631,
432,
34856,
6321,
67736,
84,
11,
71841,
80409,
432,
543,
370,
65674,
11,
26349,
468,
5348,
198,
2123,
48296,
287,
11,
279,
7064,
367,
315,
15823,
2949,
264,
10652,
477,
6339,
685,
11,
374,
264,
4279,
6057,
1413,
25885,
430,
13980,
304,
2814,
50923,
3705,
6165,
4028,
279,
1917,
13,
1115,
10795,
8544,
55580,
20414,
369,
1889,
48296,
291,
39841,
323,
18955,
11688,
29225,
13,
1226,
62425,
3249,
21315,
2082,
48296,
291,
1495,
323,
8982,
374,
7718,
369,
4857,
25530,
55975,
323,
6067,
430,
16681,
449,
3932,
304,
2814,
50923,
10977,
13,
1666,
1889,
48296,
287,
828,
323,
5070,
527,
59290,
11,
584,
1160,
1148,
374,
2561
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
32,
24507,
315,
6247,
48296,
291,
39841,
323,
11688,
29225,
198,
31192,
352,
3444,
29508,
640,
11,
735,
8671,
67631,
432,
34856,
6321,
67736,
84,
11,
71841,
80409,
432,
543,
370,
65674,
11,
26349,
468,
5348,
198,
2123,
48296,
287,
11,
279,
7064,
367,
315,
15823,
2949,
264,
10652,
477,
6339,
685,
11,
374,
264,
4279,
6057,
1413,
25885,
430,
13980,
304,
2814,
50923,
3705,
6165,
4028,
279,
1917,
13,
1115,
10795,
8544,
55580,
20414,
369,
1889,
48296,
291,
39841,
323,
18955,
11688,
29225,
13,
1226,
62425,
3249,
21315,
2082,
48296,
291,
1495,
323,
8982,
374,
7718,
369,
4857,
25530,
55975,
323,
6067,
430,
16681,
449,
3932,
304,
2814,
50923,
10977,
13,
1666,
1889,
48296,
287,
828,
323,
5070,
527,
59290,
11,
584,
1160,
1148,
374,
2561,
-100
] |
PA President Mahmoud Abbas on official PA TV. Photo: PMW/YouTube/Screenshot.
JNS.org – Palestinian Authority (PA) President Mahmoud Abbas must be surprised at the international outcry over his accusation this week that Israeli rabbis are plotting to poison Arab wells. After all, Abbas and his colleagues have been making similar allegations for more than 30 years, yet the international community has hardly said a word.
The best-known allegation was the declaration by Yasser Arafat's wife, Suha, at a 1999 press conference that Israel was engaged in the "daily and intensive use of poisonous gas" against Palestinians, as part of a plan that was causing "an increase in cancer cases among women and children." The Israelis had also contaminated 80 percent of the PA's water sources with "chemical materials," she said.
The episode sparked controversy because then-first lady Hillary Clinton was sitting next to Suha Arafat at the time and did not respond. Clinton later said she was unaware of Mrs. Arafat's statement because her headphones were not working at that moment.
One of the first — and, from the standpoint of anti-Israel propaganda, most successful — such allegations in modern times began in the small Palestinian village of Arabbe in the spring of 1983. A schoolgirl who opened a window in her classroom fainted. Her classmates detected a strong odor of "rotten fish or eggs," and some of them also fainted. Both Palestinian and Israeli doctors who visited the scene that day reported a strong smell of hydrogen sulphide, which commonly occurs in raw sewage.
The yellow dust turned out to be pollen. A mysterious tin of white powder that supposedly was an Israeli gas was found to be evaporated milk. And a bottle of strong-smelling liquid that Palestinians found "suspicious" was nothing more than a common household disinfectant.
The Israeli authorities soon found evidence that the entire episode had been cooked up by Palestine Liberation Organization propagandists. One Palestinian activist claiming symptoms of "poisoning" was found to have had himself hospitalized six times, and he was caught "pressuring girls to continue to remain in hospital," the Jerusalem Post reported. Masked militants in Nablus made announcements over a local mosque's public address system that the city's water had been polluted by the Israelis. Some local Arab doctors acknowledged that "they were being pressured not to release the girls from hospital," according to the Jerusalem Post.
Separate investigations by the World Health Organization and the International Red Cross likewise found no evidence of any Israeli poisoning.
Nonetheless, Arafat never retracted his accusations about Arrabe. Perhaps, then, it was fitting that after Arafat died from a stroke in 2004, PA officials claimed he had been poisoned by Israel — and continued spreading that blood libel long after multiple international investigations found no evidence that the Israelis poisoned him.
Dr. Rafael Medoff is the author of 16 books about Jewish history and Zionism. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,914 | [
128000,
8201,
4900,
94286,
71245,
389,
4033,
13174,
6007,
13,
11064,
25,
5975,
54,
14,
54846,
11628,
32209,
627,
41,
2507,
2726,
1389,
22596,
22677,
320,
8201,
8,
4900,
94286,
71245,
2011,
387,
14792,
520,
279,
6625,
88963,
927,
813,
65506,
420,
2046,
430,
16286,
436,
12806,
285,
527,
45002,
311,
21109,
10989,
48396,
13,
4740,
682,
11,
71245,
323,
813,
18105,
617,
1027,
3339,
4528,
18873,
369,
810,
1109,
220,
966,
1667,
11,
3686,
279,
6625,
4029,
706,
20781,
1071,
264,
3492,
627,
791,
1888,
22015,
58494,
574,
279,
18489,
555,
816,
34858,
362,
15817,
266,
596,
7555,
11,
17360,
4317,
11,
520,
264,
220,
2550,
24,
3577,
10017,
430,
6921,
574,
17045,
304,
279,
330,
49174,
323,
37295,
1005,
315,
74508,
6962,
1,
2403,
34234,
11
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
8201,
4900,
94286,
71245,
389,
4033,
13174,
6007,
13,
11064,
25,
5975,
54,
14,
54846,
11628,
32209,
627,
41,
2507,
2726,
1389,
22596,
22677,
320,
8201,
8,
4900,
94286,
71245,
2011,
387,
14792,
520,
279,
6625,
88963,
927,
813,
65506,
420,
2046,
430,
16286,
436,
12806,
285,
527,
45002,
311,
21109,
10989,
48396,
13,
4740,
682,
11,
71245,
323,
813,
18105,
617,
1027,
3339,
4528,
18873,
369,
810,
1109,
220,
966,
1667,
11,
3686,
279,
6625,
4029,
706,
20781,
1071,
264,
3492,
627,
791,
1888,
22015,
58494,
574,
279,
18489,
555,
816,
34858,
362,
15817,
266,
596,
7555,
11,
17360,
4317,
11,
520,
264,
220,
2550,
24,
3577,
10017,
430,
6921,
574,
17045,
304,
279,
330,
49174,
323,
37295,
1005,
315,
74508,
6962,
1,
2403,
34234,
11,
-100
] |
IT NATION 2015 – Great White North Technology Consulting Inc.
At GWNTC, we like to invest in our staff. Making sure they stay current is really important to us. That's why we buy all kinds of new technology to play around with and also send our team all over the world for training and conferences. We believe that investing in our people will drive the company forward.
In the tech industry we have several line of business applications that we rely on a lot to do our day to day tasks. These tools are critical to our business so it's very important that master them in order to streamline our work and provide our customers with awesome and quick support.
IT Nation is one of the most important conferences that we will attend this year. Almost every software company, vendor and distributor that we use and purchase from will be in attendance. We get to talk and network with these people to solidify the relationships and provide our customers with better service. The conference is also jam packed with sessions that will teach us valuable skills and show us new technologies and trends. We learn a lot from conferences like these. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,660 | [
128000,
964,
452,
3579,
220,
679,
20,
1389,
8681,
5929,
4892,
12053,
47511,
4953,
627,
1688,
42353,
6542,
34,
11,
584,
1093,
311,
2793,
304,
1057,
5687,
13,
25274,
2771,
814,
4822,
1510,
374,
2216,
3062,
311,
603,
13,
3011,
596,
3249,
584,
3780,
682,
13124,
315,
502,
5557,
311,
1514,
2212,
449,
323,
1101,
3708,
1057,
2128,
682,
927,
279,
1917,
369,
4967,
323,
38614,
13,
1226,
4510,
430,
26012,
304,
1057,
1274,
690,
6678,
279,
2883,
4741,
627,
644,
279,
13312,
5064,
584,
617,
3892,
1584,
315,
2626,
8522,
430,
584,
17631,
389,
264,
2763,
311,
656,
1057,
1938,
311,
1938,
9256,
13,
4314,
7526,
527,
9200,
311,
1057,
2626,
779,
433,
596,
1633,
3062,
430,
7491,
1124,
304,
2015,
311,
82703,
1057,
990,
323,
3493
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
964,
452,
3579,
220,
679,
20,
1389,
8681,
5929,
4892,
12053,
47511,
4953,
627,
1688,
42353,
6542,
34,
11,
584,
1093,
311,
2793,
304,
1057,
5687,
13,
25274,
2771,
814,
4822,
1510,
374,
2216,
3062,
311,
603,
13,
3011,
596,
3249,
584,
3780,
682,
13124,
315,
502,
5557,
311,
1514,
2212,
449,
323,
1101,
3708,
1057,
2128,
682,
927,
279,
1917,
369,
4967,
323,
38614,
13,
1226,
4510,
430,
26012,
304,
1057,
1274,
690,
6678,
279,
2883,
4741,
627,
644,
279,
13312,
5064,
584,
617,
3892,
1584,
315,
2626,
8522,
430,
584,
17631,
389,
264,
2763,
311,
656,
1057,
1938,
311,
1938,
9256,
13,
4314,
7526,
527,
9200,
311,
1057,
2626,
779,
433,
596,
1633,
3062,
430,
7491,
1124,
304,
2015,
311,
82703,
1057,
990,
323,
3493,
-100
] |
Alpine skiing, Nordic skiing, locker deposit.
With our 2 sales points in Folgaria, in the resorts of Fondo grande and Francolinni, we offer the best brands on the market at excellent prices. Not just skis, but everything you need for having fun in the snow.
Large deposit with lockers in Fondo grande, Folgaria, with more than 80 heated lockers that can be opened with a skipass. Deposit controlled directly in the ski rental.
Don't be without skis during your holiday. Book directly through our website from your home. On your arrival in Folgaria, pick up your skiing equipment and enjoy your holiday!
We are professionals within the world of skiing and we know how to advise you in your selection of materials suitable to your needs. Above all, we are like you.
Don't take a risk! Book now so that you are not left without skis! | {
"redpajama_set_name": "RedPajamaC4"
} | 439 | [
128000,
2149,
39138,
63117,
11,
64466,
63117,
11,
35779,
16946,
627,
2409,
1057,
220,
17,
6763,
3585,
304,
40555,
70,
10649,
11,
304,
279,
61545,
315,
435,
36071,
25626,
323,
9893,
337,
6258,
72,
11,
584,
3085,
279,
1888,
16097,
389,
279,
3157,
520,
9250,
7729,
13,
2876,
1120,
1940,
285,
11,
719,
4395,
499,
1205,
369,
3515,
2523,
304,
279,
12056,
627,
35353,
16946,
449,
5409,
388,
304,
435,
36071,
25626,
11,
40555,
70,
10649,
11,
449,
810,
1109,
220,
1490,
32813,
5409,
388,
430,
649,
387,
9107,
449,
264,
10936,
395,
13,
49571,
14400,
6089,
304,
279,
29779,
19160,
627,
8161,
956,
387,
2085,
1940,
285,
2391,
701,
13560,
13,
6017,
6089,
1555,
1057,
3997,
505,
701,
2162,
13,
1952,
701,
19163,
304,
40555,
70,
10649
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
2149,
39138,
63117,
11,
64466,
63117,
11,
35779,
16946,
627,
2409,
1057,
220,
17,
6763,
3585,
304,
40555,
70,
10649,
11,
304,
279,
61545,
315,
435,
36071,
25626,
323,
9893,
337,
6258,
72,
11,
584,
3085,
279,
1888,
16097,
389,
279,
3157,
520,
9250,
7729,
13,
2876,
1120,
1940,
285,
11,
719,
4395,
499,
1205,
369,
3515,
2523,
304,
279,
12056,
627,
35353,
16946,
449,
5409,
388,
304,
435,
36071,
25626,
11,
40555,
70,
10649,
11,
449,
810,
1109,
220,
1490,
32813,
5409,
388,
430,
649,
387,
9107,
449,
264,
10936,
395,
13,
49571,
14400,
6089,
304,
279,
29779,
19160,
627,
8161,
956,
387,
2085,
1940,
285,
2391,
701,
13560,
13,
6017,
6089,
1555,
1057,
3997,
505,
701,
2162,
13,
1952,
701,
19163,
304,
40555,
70,
10649,
-100
] |
Cats reunited
A lovely cat, yesterday
" I simply said Colin's name and he instantly recognised me. He bounded up to me and stuck his head under my arm"
| by Kristian Dando
It's often the way with cats. They'll have a daily routine of popping out of the house for an explore and a sniff around before coming inside. But one day, they don't come back home when they're supposed to. More often than not, they'll turn up after a day or so, completely unperturbed. But sometimes they don't.
This is why microchipping your pet is a vital part of responsible pet ownership. It'll allow your cat or dog to be returned to you once it has been scanned – sometimes years after you may have given up hope of ever seeing your pet again. It may even save you money on pet insurance, too.
We've rounded up some remarkable cases of cats making their way back home after their owners had all but given up hope – sometimes after years have passed.
'Snow' place like home for wandering Colin
In 2010, a black cat called Colin was reunited with his owners four years after he ran away – just in time for Christmas.
Colin, who was found as a feral kitten was said to always have had "a touch of the wild about him" and made a dash for freedom in August 2006 after his owners, Peter and Maria O'Neill, had moved houses in Garstang, Lancashire.
Distressed Maria and Peter made every effort to track Colin down. They searched the streets, and even placed an advert in the local paper. But after a while, they gave up hope of ever seeing him again.
Soon after, they upped sticks again, to Ingleby-Barwick near Middlesbrough.
But in December 2010, a black cat was found lurking round a garden in Peter and Maria's old locale in Garstang. It was taken to the Preston branch of Cats Protection, where the O'Neills were traced to their new home on the other side of the North of England. It was Colin.
Maria recalled back in 2010: "I couldn't believe it when I got a call to say Colin had been found. It was really the best Christmas present I could have hoped for."
"In the last couple of years, we have adopted a son, Liam, and I told him stories about my pet cat Colin who he sadly would never get to meet. Liam was just as excited as my husband and I were when we heard Colin had been found!"
"When I went to pick Colin up, he was quite nervous and cowering in the corner of a pen. I simply said his name and he instantly recognised me. He bounded up to me and stuck his head under my arm. It was just a magical moment and it left me close to tears!"
(Picture: Peter O'Neill)
Missing moggie found on Facebook
A black-and-white cat called Fluffy who had gone missing for a year was reunited with her owners via Facebook.
Fluffy went missing in early 2010, and his owner Karen Walker did everything she thought she could to find him. Alas, he couldn't be found.
A year later, Karen stumbled upon a picture which looked just like her missing moggie on the Facebook page of a Cats Protection fosterer – it turned out to be Fluffy.
He'd turned up in the neigbouring village of Oldswinford – a short distance from Karen's home in Wollaston. A family who had been feeding him contacted Cats Protection, who took him in, giving Fluffy a chance at being reunited with his owner.
(Picture: Nigel Walker)
A decade apart for Nuts and his owner
In surely one of the most outlandish cases of pets being reunited, a twelve year old ginger tom going by the name of Nuts was reunited with his owner, Bunny McCullough after more than ten years apart.
Nuts went missing from his home in Froggatt, Derbyshire in 2001, and after several searches failed to locate him, his owner Bunny had given up hope.
But this year, a cat was taken to Cats Protection's Chesterfield and District branch after an elderly lady who'd been looking after him passed away. After scanning his microchip, his true indentity was revealed and he was reunited with Bunny.
She said: "I was amazed and delighted to get the call to tell me Nuts had been found. I had long given up hope of seeing him again so I was a bit bemused to say the least!
Nuts was very subdued for the first two days back home but he's quickly recovered his old character and he runs around the house like he's never been away. If I hadn't had him microchipped I would never have found him or known what happened to him."
(Picture: Chris James photography)
STEPS TO TAKE IF YOUR CAT IS LOST….
• Check your garden and home thoroughly, including sheds or garages.
• Take a walk around the area and call out for them – the sound of your voice may bring them out of hiding and back home.
• Leave out your cat's favourite toy, along with a blanket or bedding it usually sleeps on and some food and water.
• If you still don't have any luck, make some flyers with a description of your cat: age, gender, eye colours and distinguishing features are all essential, and a photo could make a big difference. And make sure you leave a number!
• As Fluffy's case shows, social networking has been a game-changer for finding lost pets. Get on Twitter and Facebook and notify the world.
• If your cat is microchipped, call Petlog, the cat microchipping company to register them as missing.
• Give organisations like RSPCA, Cats Protection or any other animal rescue centres a call to tell them your pet is lost.
• It's a tough call to make, but your local council's Environmental Health department may keep a record of cats killed on the roads. It's worth calling to help rule it out.
• Don't give up hope – as Nuts' story shows, your cat may return home when you least expect it.
How soon is meow? | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 8,689 | [
128000,
34,
1900,
77979,
198,
32,
17104,
8415,
11,
13985,
198,
1,
358,
5042,
1071,
40979,
596,
836,
323,
568,
22571,
39764,
757,
13,
1283,
62215,
709,
311,
757,
323,
16075,
813,
2010,
1234,
856,
6916,
702,
91,
555,
27973,
1122,
423,
4988,
198,
2181,
596,
3629,
279,
1648,
449,
19987,
13,
2435,
3358,
617,
264,
7446,
14348,
315,
50949,
704,
315,
279,
3838,
369,
459,
13488,
323,
264,
58387,
2212,
1603,
5108,
4871,
13,
2030,
832,
1938,
11,
814,
1541,
956,
2586,
1203,
2162,
994,
814,
2351,
10171,
311,
13,
4497,
3629,
1109,
539,
11,
814,
3358,
2543,
709,
1306,
264,
1938,
477,
779,
11,
6724,
22355,
531,
75325,
13,
2030,
7170,
814,
1541,
956,
627,
2028,
374,
3249,
8162,
331,
5772,
701,
6896,
374,
264,
16595
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
34,
1900,
77979,
198,
32,
17104,
8415,
11,
13985,
198,
1,
358,
5042,
1071,
40979,
596,
836,
323,
568,
22571,
39764,
757,
13,
1283,
62215,
709,
311,
757,
323,
16075,
813,
2010,
1234,
856,
6916,
702,
91,
555,
27973,
1122,
423,
4988,
198,
2181,
596,
3629,
279,
1648,
449,
19987,
13,
2435,
3358,
617,
264,
7446,
14348,
315,
50949,
704,
315,
279,
3838,
369,
459,
13488,
323,
264,
58387,
2212,
1603,
5108,
4871,
13,
2030,
832,
1938,
11,
814,
1541,
956,
2586,
1203,
2162,
994,
814,
2351,
10171,
311,
13,
4497,
3629,
1109,
539,
11,
814,
3358,
2543,
709,
1306,
264,
1938,
477,
779,
11,
6724,
22355,
531,
75325,
13,
2030,
7170,
814,
1541,
956,
627,
2028,
374,
3249,
8162,
331,
5772,
701,
6896,
374,
264,
16595,
-100
] |
Clients generally sought after to buy quality items, so we are committed with Exporting, Manufacturing and Supplying a best nature of Waste Water Commercial Strainers in Pimpri, Maharashtra, India. These are designed making use of ideal quality material and exceptionally tried for their quality in different parameters under the assistance of our quality controllers. Alongside this, these Commercial Strainers are accessible at exceptionally market minimal selling costs.
Established in 2011, Hamdule Industries has been a leading name in offering top notch Pipes & Pipe Fittings. Located in Pimpri, Maharashtra, we offer the best quality Waste Water Commercial Strainers to our customers at best prices in the industry. | {
"redpajama_set_name": "RedPajamaC4"
} | 1,446 | [
128000,
48274,
8965,
16495,
1306,
311,
3780,
4367,
3673,
11,
779,
584,
527,
11411,
449,
22981,
287,
11,
42177,
323,
30909,
287,
264,
1888,
7138,
315,
49522,
10164,
28943,
4610,
21211,
304,
393,
6802,
462,
11,
68519,
11,
6890,
13,
4314,
527,
6319,
3339,
1005,
315,
10728,
4367,
3769,
323,
48298,
6818,
369,
872,
4367,
304,
2204,
5137,
1234,
279,
13291,
315,
1057,
4367,
27319,
13,
32944,
3002,
420,
11,
1521,
28943,
4610,
21211,
527,
15987,
520,
48298,
3157,
17832,
11486,
7194,
627,
69320,
291,
304,
220,
679,
16,
11,
9777,
1072,
273,
37528,
706,
1027,
264,
6522,
836,
304,
10209,
1948,
51554,
79823,
612,
28905,
435,
53359,
13,
42867,
304,
393,
6802,
462,
11,
68519,
11,
584,
3085,
279,
1888,
4367,
49522,
10164,
28943,
4610,
21211,
311
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48274,
8965,
16495,
1306,
311,
3780,
4367,
3673,
11,
779,
584,
527,
11411,
449,
22981,
287,
11,
42177,
323,
30909,
287,
264,
1888,
7138,
315,
49522,
10164,
28943,
4610,
21211,
304,
393,
6802,
462,
11,
68519,
11,
6890,
13,
4314,
527,
6319,
3339,
1005,
315,
10728,
4367,
3769,
323,
48298,
6818,
369,
872,
4367,
304,
2204,
5137,
1234,
279,
13291,
315,
1057,
4367,
27319,
13,
32944,
3002,
420,
11,
1521,
28943,
4610,
21211,
527,
15987,
520,
48298,
3157,
17832,
11486,
7194,
627,
69320,
291,
304,
220,
679,
16,
11,
9777,
1072,
273,
37528,
706,
1027,
264,
6522,
836,
304,
10209,
1948,
51554,
79823,
612,
28905,
435,
53359,
13,
42867,
304,
393,
6802,
462,
11,
68519,
11,
584,
3085,
279,
1888,
4367,
49522,
10164,
28943,
4610,
21211,
311,
-100
] |
Experience Alps to the full extent on a combo tour from Munich to the Ettal Monastery and Germany's highest peak - Zugspitze!
This trip will start with a visit to the beautiful Ettal Monastery, which was founded in 1330 by Holy Roman Emperor Ludwig the Bavarian for a group of knights and a community of Benedictine monks. You will evidence the life of Benedictine monks who still live there.
The visit will be followed by a drive through Garmisch-Partenkirchen and on to Eibsee, where you will take a cable car to the summit of the Zugspitze, the highest mountain in Germany. Enjoy the panoramic views from the observation platform! On a clear day you can see over a thousand Bavarian, Austrian, Swiss and Italian mountain peaks at once.
After this picturesque trip, you will go back down the mountain by cogwheel train.
Children: 0-3 years old: free when sharing a seat with an adult / 4-14 years old: reduced.
Attention: Please bring your printed electronic voucher with you to the bus at the departure point. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,953 | [
128000,
35215,
94000,
311,
279,
2539,
13112,
389,
264,
23569,
7364,
505,
47304,
311,
279,
469,
5683,
278,
3206,
54671,
323,
10057,
596,
8592,
16557,
482,
77816,
2203,
275,
3059,
4999,
2028,
8577,
690,
1212,
449,
264,
4034,
311,
279,
6366,
469,
5683,
278,
3206,
54671,
11,
902,
574,
18538,
304,
220,
9423,
15,
555,
19229,
13041,
35414,
85550,
279,
78080,
8997,
369,
264,
1912,
315,
71630,
323,
264,
4029,
315,
62245,
483,
66477,
13,
1472,
690,
6029,
279,
2324,
315,
62245,
483,
66477,
889,
2103,
3974,
1070,
627,
791,
4034,
690,
387,
8272,
555,
264,
6678,
1555,
480,
2227,
16438,
12,
5920,
268,
69031,
7674,
323,
389,
311,
469,
581,
4151,
11,
1405,
499,
690,
1935,
264,
14994,
1841,
311,
279,
30048,
315,
279,
77816,
2203,
275
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
35215,
94000,
311,
279,
2539,
13112,
389,
264,
23569,
7364,
505,
47304,
311,
279,
469,
5683,
278,
3206,
54671,
323,
10057,
596,
8592,
16557,
482,
77816,
2203,
275,
3059,
4999,
2028,
8577,
690,
1212,
449,
264,
4034,
311,
279,
6366,
469,
5683,
278,
3206,
54671,
11,
902,
574,
18538,
304,
220,
9423,
15,
555,
19229,
13041,
35414,
85550,
279,
78080,
8997,
369,
264,
1912,
315,
71630,
323,
264,
4029,
315,
62245,
483,
66477,
13,
1472,
690,
6029,
279,
2324,
315,
62245,
483,
66477,
889,
2103,
3974,
1070,
627,
791,
4034,
690,
387,
8272,
555,
264,
6678,
1555,
480,
2227,
16438,
12,
5920,
268,
69031,
7674,
323,
389,
311,
469,
581,
4151,
11,
1405,
499,
690,
1935,
264,
14994,
1841,
311,
279,
30048,
315,
279,
77816,
2203,
275,
-100
] |
How does a vacuum cleaner create suction?
Chrystal Johnson
Technology. The suction of a vacuum is created by a difference in air pressure. A fan powered by an electric motor (often a universal motor) lowers the pressure inside the machine. Atmospheric pressure then forces the air through the carpet and into the nozzle, essentially pushing the dust into the bag. The fan also acts as a handle for moving the vacuum around the house.
The power required to operate most household vacuum cleaners is supplied by two or three plug-in wall outlets. Most machines have switches on/off buttons which can be used to switch them on and off easily. Some have lights that indicate when they are switched on and off. Other features include a height adjustment for cleaning floorboards, and a handhold for reaching hard-to-get places.
Vacuum cleaners were first made in the early 20th century. The first functional design was invented by Eureka Williams and introduced in 1938. It used electric motors instead of belts or screws for its operating system, which improved performance and reduced maintenance requirements.
In modern machines, airflow is generated by a fan mounted within a cylindrical shell. This rotates between 300 and 1200 revolutions per minute (rpm), depending on model type. Airflow increases as the square of rpm, so high-powered models can remove more dust than low-powered ones. Filters prevent particles from clogging the fan, while heat dissipaters reduce the temperature of the air being drawn in.
How does a vacuum work for sanding the floor?
What is the function of a vacuum cleaner?
Does vacuuming really clean carpet?
The suction of the vacuum draws in the dust as it develops. This prevents it (almost all of it) from dispersing in the air and/or falling to the floor. Better models for dustless sanding go a step further by first filtering the dust into a bucket filled with water. The filter traps the dust while allowing water to pass through.
Vacuums are used for dusting too, but they use compressed air instead of suction. Compressed air is more efficient than suction at dusting because less power is required. Also, a vacuum can be used for dusting without turning on its motor, which saves energy.
Finally, vacuums are useful tools for cleaning up after your pets. All that hair that they drag in from their adventures will get trapped in the vacuum's filter just like any other type of particle collector.
There are two main types of vacuum cleaners: upright and cylinder. Both have advantages and disadvantages, so it's important to know what you need before you buy one.
Uprights were originally designed for use in homes, but they're also used in commercial settings because they're efficient and easy to use. They consist of a head with a hose that connects to a vacuum pump (not shown in picture) that creates the suction needed to pull dirt and debris out of a room.
A vacuum cleaner, commonly known as a hoover or just a vacuum, is a device that utilizes suction to remove material from floors, upholstery, draperies, and other surfaces. It is usually powered by electricity. A dustbag or a cyclone collects the waste for subsequent disposal. Vacuum cleaners were originally invented by Karl Hoover in 1908. He called his invention "The Dustless Dustpan". Modern vacuum cleaners use an electric motor instead of hand-powered brushes. This motor is attached to a handle or stick that can be pushed or pulled through the room being cleaned.
In addition to removing dust, debris, and other small particles from furniture and flooring, a vacuum cleaner can also be used for cleaning cars, windows, and other objects. Some models are equipped with additional tools such as sprayers for washing walls or doors, or brushes for sweeping floors.
Vacuum cleaners have been popular devices for home use since they were introduced into the United States market in the 1950s. Since then, they have become more efficient, less expensive, and easier to operate. In fact, some models now include buttons that allow users to control the strength of the suction via touch screen interface.
Vacuums have several advantages over traditional sweepers: they can reach areas that sweeps cannot, such as under beds and along baseboards; they do not leave loose particles on carpets; and they do not spread germs around the house.
Vacuuming merely eliminates dirt and dust from the carpet's surface. Even the most powerful vacuum cleaners leave dust mites, dead skin cells, germs, pet dander, pollen, and allergies hiding beneath the surface of your carpet. However, these items cannot be eliminated entirely from carpets; they can only be reduced to an acceptable level for allergic individuals.
Cleaning carpets helps keep allergens out of your home and lungs. Allergic reactions to substances such as house dust mites, pets, and pollens are common sources of asthma and other respiratory diseases. Keeping carpets clean reduces the amount of allergen in the air that people breathe in when they come into contact with furniture upholstered in fabric or leather that has been worn by animals or people. This can help those who suffer from allergies avoid symptoms when at home or away from home.
Carpet cleaning also removes soil that can otherwise get on furniture. Clean carpets prevent furniture from becoming stained or marked by oil or food particles. Vacuum cleaner bags and filters can also become full of dirt over time if not changed regularly. Cleaning your carpet annually is recommended by many health professionals because it gets rid of insects and other pests that may have made their way into the fiber of the carpet.
Chrystal Johnson loves to garden and enjoys taking care of the plants that she grows. She has been doing this for many years and knows all there is to know about plants. Chrystal enjoys sharing her knowledge on gardening with others because she finds it to be very rewarding.
Can you polish silestone?
How does a water well pump work and how does it work?
Author: Catherine Clower
Can you vacuum mouse droppings with a HEPA filter?
Author: Michael Henke
Can you vacuum ash?
Author: Maria Mccluer
Is it safe to useWD40 on stainless steel appliances?
By Franklin Quinonez
Can I put baking soda in my carpet cleaner?
By Chrystal Johnson
Does coal burn cleaner than wood?
By Teri Degarmo
What is the best type of duct cleaning? | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 8,574 | [
128000,
4438,
1587,
264,
29302,
32981,
1893,
84878,
5380,
88325,
14272,
11605,
198,
63507,
13,
578,
84878,
315,
264,
29302,
374,
3549,
555,
264,
6811,
304,
3805,
7410,
13,
362,
8571,
23134,
555,
459,
9249,
9048,
320,
61917,
264,
20789,
9048,
8,
73115,
279,
7410,
4871,
279,
5780,
13,
87597,
7410,
1243,
8603,
279,
3805,
1555,
279,
28954,
323,
1139,
279,
82981,
11,
16168,
17919,
279,
16174,
1139,
279,
9145,
13,
578,
8571,
1101,
14385,
439,
264,
3790,
369,
7366,
279,
29302,
2212,
279,
3838,
627,
791,
2410,
2631,
311,
14816,
1455,
14048,
29302,
75965,
374,
17665,
555,
1403,
477,
2380,
20206,
3502,
7147,
28183,
13,
7648,
12933,
617,
32267,
389,
51906,
12706,
902,
649,
387,
1511,
311,
3480,
1124,
389,
323,
1022,
6847,
13,
4427,
617,
13001
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
4438,
1587,
264,
29302,
32981,
1893,
84878,
5380,
88325,
14272,
11605,
198,
63507,
13,
578,
84878,
315,
264,
29302,
374,
3549,
555,
264,
6811,
304,
3805,
7410,
13,
362,
8571,
23134,
555,
459,
9249,
9048,
320,
61917,
264,
20789,
9048,
8,
73115,
279,
7410,
4871,
279,
5780,
13,
87597,
7410,
1243,
8603,
279,
3805,
1555,
279,
28954,
323,
1139,
279,
82981,
11,
16168,
17919,
279,
16174,
1139,
279,
9145,
13,
578,
8571,
1101,
14385,
439,
264,
3790,
369,
7366,
279,
29302,
2212,
279,
3838,
627,
791,
2410,
2631,
311,
14816,
1455,
14048,
29302,
75965,
374,
17665,
555,
1403,
477,
2380,
20206,
3502,
7147,
28183,
13,
7648,
12933,
617,
32267,
389,
51906,
12706,
902,
649,
387,
1511,
311,
3480,
1124,
389,
323,
1022,
6847,
13,
4427,
617,
13001,
-100
] |
The McDaniel Hostage Crisis – Day 29:...
The McDaniel Hostage Crisis – Day 29: Racism, Reparations, Mamacitas, & getting outplayed
We interrupt this coverage for a special report.
Chris McDaniel's two favorite words these days seem to be 'fight' and 'race-baiting.' He's used them almost daily in the month since he lost the June 24 Mississippi US Senate Republican runoff to keep the hype and hope alive in his most rabid supporters.
It is bordering on hysteria for some, with one mother admitting on Facebook that she ignored her children to follow McDaniel's actions.
It became clear over the last week what McDaniel means by 'fight,' that is he wants to purge his adversaries from the Republican ranks.
Red blooded Southerners relish a good fight especially when they feel put down, overshadowed and picked on. McDaniel was just smart enough to mix that old Southern attitude with some constitutional sounding talking points while pandering to the fears of hopeful right wing voters.
However, the rhetoric of fight isn't principled at this point; it's personal. He's as mad as Hell and he's not going to take it anymore (for whatever that's worth).
But what is race-baiting and was it used to defeat McDaniel by Thad Cochran's campaign?
Race-baiting, as defined by Merriam-Webster, is "the unfair use of statements about race to try to influence the actions or attitudes of a particular group of people."
A Jackson State political science professor was recently asked if he considered the materials McDaniel claims Cochran used in the run up to June 24 as race-baiting. The professor, a black man, said what he saw would not be considered race-baiting.
I went back and reviewed the flyer McDaniel continues to hold up as evidence in his war on Republicans and blacks. It would seem nowhere on it was McDaniel or his supporters called a racist; it portrayed him and the Tea Party as not African American friendly by way of McDaniel's voting record, a tactic McDaniel himself employed against Cochran by spinning the senior Senator's voting record and labeling him as 'liberal.'
By no means is Chris McDaniel the second coming of David Duke, but a reasonable person could look at a snapshot of votes that McDaniel has cast and some things he has said and conclude that at best he would be indifferent to the needs of people of color or to their potential inclusion in the Republican Party.
Let's look at some of those votes…
He voted against funding for the Civil Rights Museum and went out of his way by pairing votes after the fact to vote against this year's bond bill that prominently featured funding for HBCUs in Mississippi while previously voting for funding of Civil War preservation areas like Beauvior and Shiloh.
On his former radio show, he railed against Latinos and chose to talk derisively about reparations, a subject he alone chose to go out of his way to engage in without prompting.
He said hip-hop promotes the "destruction of community values."
He was scheduled to speak at a rally with a White Pride vendor, which he later tried to two step around, but never disavowed the vendor or the rally.
None of the above listed facts are up for debate, and McDaniel has not one time tried to clean any of this up or made any sort of programmatic outreach to the black community in the wake of their revelations. The crocodile tears he's crying seems to indicate that he's a lot more concerned now about white folks thinking that he's a racist than black folks. Otherwise, he would have truly cleaned up some of these issues months ago and made a real effort to court black voters.
In fact, he's still saying in one breath how offended he is of being portrayed as a racist and in the next bemoaning '40,000 liberal Democrat' illegal votes, votes he clearly lays at the feet of black Mississippians.
It is not a stretch, then, for a reasonable person, particularly an African American, to look at all of those facts and conclude that in relative terms McDaniel would be worse for black voters than Cochran. That was obviously the calculus at play whether he wants to admit it or not.
Again, McDaniel's campaign assisted in doing a similar thing to Cochran, labeling him as liberal, out of touch, old, senile, and worse.
When you add in McDaniel's fight rhetoric it's becomes even easier to see why black Mississippians would want to have their voices heard for Cochran.
McDaniel and the social media trolls may not like it but when you flip the script what his campaign did and had they won it would have been they who set race relations back 50 years in Mississippi out of their want of exclusiveness.
Having people crossover vote just to mess with the other party is certainly not a good thing but McDaniel is certainly not the first "victim" of crossover voting. And the alternative of making people register forever attempts to freeze and trap voter bases making it difficult to grow the party.
Whining and wailing isn't going to change the outcome. That's why in our system having a broad appeal, inclusive of blacks, is a winning strategy.
Let's be honest. McDaniel used white Southern fear to divide Mississippi's Republican Party during this primary, deftly playing off the emotions that some still keep buried deep down inside. And it almost worked. But it is McDaniel who is accusing Cochran of race-baiting, when in actuality the groups that exposed McDaniel to the black community used his own words and voting record.
Both Cochran and McDaniel participated in campaign tactics that painted the other in a negative light, yet one is wearing his emotion on his sleeve, playing the 'woe is me, look how they treated me' card when he, too, played his part in making this Mississippi race the ugliest in the nation.
That's the way it was – Day 29 of the McDaniel Hostage Crisis.
Good day Mississippi – and good luck.
MS political reactions to Obamacare appellate decision
Congressman Palazzo applauds passage of Honor Flight Act
Autonomous vehicle legislation passes out of Mississippi House Committee
Chairman Rep. Busby says AVs are destined to be part of our commerce and it's imperative the state has regulations that support them and Mississippi. Last week, lawmakers passed House Bill 1003 out of the Mississippi House Transportation Committee. Authored by State Representative Charles Busby (R), chairman of the House committee, the legislation would establish… | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 2,523 | [
128000,
791,
4584,
41686,
16492,
425,
46250,
1389,
6187,
220,
1682,
25,
9522,
791,
4584,
41686,
16492,
425,
46250,
1389,
6187,
220,
1682,
25,
56806,
2191,
11,
3402,
277,
811,
11,
386,
33707,
21920,
11,
612,
3794,
704,
51908,
198,
1687,
12956,
420,
10401,
369,
264,
3361,
1934,
627,
32978,
4584,
41686,
596,
1403,
7075,
4339,
1521,
2919,
2873,
311,
387,
364,
21828,
6,
323,
364,
42283,
1481,
1339,
287,
3238,
1283,
596,
1511,
1124,
4661,
7446,
304,
279,
2305,
2533,
568,
5675,
279,
5651,
220,
1187,
29538,
2326,
10092,
9540,
79152,
311,
2567,
279,
45990,
323,
3987,
13989,
304,
813,
1455,
31674,
307,
15879,
627,
2181,
374,
3973,
287,
389,
98766,
369,
1063,
11,
449,
832,
6691,
55689,
389,
5690,
430,
1364,
12305,
1077,
2911,
311,
1833
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
4584,
41686,
16492,
425,
46250,
1389,
6187,
220,
1682,
25,
9522,
791,
4584,
41686,
16492,
425,
46250,
1389,
6187,
220,
1682,
25,
56806,
2191,
11,
3402,
277,
811,
11,
386,
33707,
21920,
11,
612,
3794,
704,
51908,
198,
1687,
12956,
420,
10401,
369,
264,
3361,
1934,
627,
32978,
4584,
41686,
596,
1403,
7075,
4339,
1521,
2919,
2873,
311,
387,
364,
21828,
6,
323,
364,
42283,
1481,
1339,
287,
3238,
1283,
596,
1511,
1124,
4661,
7446,
304,
279,
2305,
2533,
568,
5675,
279,
5651,
220,
1187,
29538,
2326,
10092,
9540,
79152,
311,
2567,
279,
45990,
323,
3987,
13989,
304,
813,
1455,
31674,
307,
15879,
627,
2181,
374,
3973,
287,
389,
98766,
369,
1063,
11,
449,
832,
6691,
55689,
389,
5690,
430,
1364,
12305,
1077,
2911,
311,
1833,
-100
] |
There's an interesting fellow I see often on my drive home from work. He's a boxer. You can see him almost daily along the Riverwalk in Tulsa. He stands in the middle of the drainage ditch and he jumps rope and shadow boxes. I'd like to know his story, but I haven't ever had the nerve to find out. I wonder if when he was a younger man that maybe he did real boxing, but now he might be living in his imagination, but then I think that my thoughts are presumptuous. Maybe he just likes the exercise.
When I was younger I spent a lot of time praying. I prayed for the children in Africa and the people I saw on the news. I had no way of physically helping, but somehow the praying didn't feel like a copout. I felt satisfaction after I prayed and I thought it was proof of results. It seemed that it was a ping back from the source telling me Yes, that's it. You're on target. But it wasn't. It's not. It's just the chemicals in my brain telling me I've done an action that my belief system approves of. It's not confirmation of it being effective. Otherwise the continent of Africa would be full of healthy people. The bad guys controlling the countries would be dead or disabled. The wildfires of Texas, Colorado, and California would be over as well as the long drought. And yes, when I prayed for these things I had faith. I got the ping back.
If there is a god and the precepts are true then the results should be verifiable. If a disease or tragedy hits because of sin it should harm only the ones doing the wrong deed, or am I a simpleton. I'm thinking the arrow of disease is coming from the hand of a just god.
If something exists or a pattern is true then you should see results. For example, if you take a medication that has been approved by the FDA Federal Drug Administration, it's already went through Double Blind testing. There are certain tests that show it works. The man on the side of the road is getting exercise. I don't wish to mock or belittle someone for their efforts. I only want to acknowledge the difference between efforts and results. If you want the exercise of meditation or praying or even shadow boxing, yes they do have their own benefits, but if you want to knock someone out you're going to have to punch them.
Why The Church Must Stop Praying For Nigeria! | {
"redpajama_set_name": "RedPajamaC4"
} | 1,318 | [
128000,
3947,
596,
459,
7185,
12637,
358,
1518,
3629,
389,
856,
6678,
2162,
505,
990,
13,
1283,
596,
264,
79557,
13,
1472,
649,
1518,
1461,
4661,
7446,
3235,
279,
11188,
19599,
304,
75662,
13,
1283,
13656,
304,
279,
6278,
315,
279,
58592,
50104,
323,
568,
35308,
34520,
323,
12737,
15039,
13,
358,
4265,
1093,
311,
1440,
813,
3446,
11,
719,
358,
9167,
956,
3596,
1047,
279,
32015,
311,
1505,
704,
13,
358,
5895,
422,
994,
568,
574,
264,
14992,
893,
430,
7344,
568,
1550,
1972,
46329,
11,
719,
1457,
568,
2643,
387,
5496,
304,
813,
28899,
11,
719,
1243,
358,
1781,
430,
856,
11555,
527,
23073,
418,
9373,
13,
10926,
568,
1120,
13452,
279,
10368,
627,
4599,
358,
574,
14992,
358,
7543,
264,
2763,
315,
892,
52232,
13
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
3947,
596,
459,
7185,
12637,
358,
1518,
3629,
389,
856,
6678,
2162,
505,
990,
13,
1283,
596,
264,
79557,
13,
1472,
649,
1518,
1461,
4661,
7446,
3235,
279,
11188,
19599,
304,
75662,
13,
1283,
13656,
304,
279,
6278,
315,
279,
58592,
50104,
323,
568,
35308,
34520,
323,
12737,
15039,
13,
358,
4265,
1093,
311,
1440,
813,
3446,
11,
719,
358,
9167,
956,
3596,
1047,
279,
32015,
311,
1505,
704,
13,
358,
5895,
422,
994,
568,
574,
264,
14992,
893,
430,
7344,
568,
1550,
1972,
46329,
11,
719,
1457,
568,
2643,
387,
5496,
304,
813,
28899,
11,
719,
1243,
358,
1781,
430,
856,
11555,
527,
23073,
418,
9373,
13,
10926,
568,
1120,
13452,
279,
10368,
627,
4599,
358,
574,
14992,
358,
7543,
264,
2763,
315,
892,
52232,
13,
-100
] |
Hillary's silence on the President's order, I discussed yesterday was too good to be true. It didn't last very long. She's making up for lost time. Her Sept 18th tweets seem to be excerpts from a fantasy book for children. She must be writing a new one because her tweets, clearly the stuff of fantasy, can't possibly be related to the President's order to declassify and make public documents that will expose, once and for all, what an absolute slug she is. She appeared on Maddow last night and tweeted about housecleaning referencing the Nixon administration. Desperate actions from a desperate cow.
She (HRC) was actually quoting from a letter sent by four leading Congressional leaders (Schiff, Schumer, Pelosi, & Feinstein) to the DOJ and FBI complaining about the violations being done by POTUS. She can't even manage to write her own material!
Previous Previous post: Was POTUS' Order a Trap? | {
"redpajama_set_name": "RedPajamaC4"
} | 9,617 | [
128000,
65476,
596,
21847,
389,
279,
4900,
596,
2015,
11,
358,
14407,
13985,
574,
2288,
1695,
311,
387,
837,
13,
1102,
3287,
956,
1566,
1633,
1317,
13,
3005,
596,
3339,
709,
369,
5675,
892,
13,
6385,
5488,
220,
972,
339,
24025,
2873,
311,
387,
84490,
505,
264,
18884,
2363,
369,
2911,
13,
3005,
2011,
387,
4477,
264,
502,
832,
1606,
1077,
24025,
11,
9539,
279,
6392,
315,
18884,
11,
649,
956,
11000,
387,
5552,
311,
279,
4900,
596,
2015,
311,
409,
95390,
323,
1304,
586,
9477,
430,
690,
29241,
11,
3131,
323,
369,
682,
11,
1148,
459,
10973,
25478,
1364,
374,
13,
3005,
9922,
389,
44637,
363,
1566,
3814,
323,
27045,
922,
3838,
18883,
287,
57616,
279,
42726,
8735,
13,
3959,
80213,
6299,
505,
264,
28495,
19923,
627
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
65476,
596,
21847,
389,
279,
4900,
596,
2015,
11,
358,
14407,
13985,
574,
2288,
1695,
311,
387,
837,
13,
1102,
3287,
956,
1566,
1633,
1317,
13,
3005,
596,
3339,
709,
369,
5675,
892,
13,
6385,
5488,
220,
972,
339,
24025,
2873,
311,
387,
84490,
505,
264,
18884,
2363,
369,
2911,
13,
3005,
2011,
387,
4477,
264,
502,
832,
1606,
1077,
24025,
11,
9539,
279,
6392,
315,
18884,
11,
649,
956,
11000,
387,
5552,
311,
279,
4900,
596,
2015,
311,
409,
95390,
323,
1304,
586,
9477,
430,
690,
29241,
11,
3131,
323,
369,
682,
11,
1148,
459,
10973,
25478,
1364,
374,
13,
3005,
9922,
389,
44637,
363,
1566,
3814,
323,
27045,
922,
3838,
18883,
287,
57616,
279,
42726,
8735,
13,
3959,
80213,
6299,
505,
264,
28495,
19923,
627,
-100
] |
Q: pytest command line argument failing I have added conftest.py at the same directory level as my test file . The content of my conftest.py :
import pytest
def pytest_addoption(parser):
parser.addoption("--l", action="store", help="Get license value")
@pytest.fixture
def lic(request):
return request.config.getoption("--l")
and following is my test file def
def test(lic):
print "testing license : %s"%lic
assert 0
But i still get following error:
pytest .\source\test_latestLinuxAgent.py --l=test
pytest : usage: pytest [options] [file_or_dir] [file_or_dir] [...]
At line:1 char:1
+ pytest .\source\test_latestLinuxAgent.py --l=test
pytest: error: ambiguous option: --l=test could match --lf, --last-failed
A: As the response says, --l option is ambiguous. What does it mean?
Let me explain it with an example. If you have --zaaaa option, the shortcut for it is --z. However, there is one condition: --zaaaa must be the only option starting with z char. Otherwise, the interpreter does not know which option should be chosen.
You can't define --l option because there are two options starting with l char: --lf and --last-failed.
I suggest creating non-conflicting option, --license would be nice.
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 3,459 | [
128000,
48,
25,
28864,
3290,
1584,
5811,
22109,
358,
617,
3779,
390,
728,
478,
7345,
520,
279,
1890,
6352,
2237,
439,
856,
1296,
1052,
662,
578,
2262,
315,
856,
390,
728,
478,
7345,
551,
720,
1179,
28864,
271,
262,
711,
28864,
2962,
2091,
36435,
997,
286,
6871,
1388,
2091,
22274,
75,
498,
1957,
429,
4412,
498,
1520,
429,
1991,
5842,
907,
1158,
262,
571,
27819,
51636,
198,
262,
711,
12553,
4980,
997,
286,
471,
1715,
5539,
673,
2091,
22274,
75,
5240,
438,
2768,
374,
856,
1296,
1052,
711,
720,
256,
711,
220,
1296,
7,
416,
997,
286,
1194,
330,
9016,
5842,
551,
1034,
82,
32491,
416,
198,
286,
2105,
220,
15,
271,
4071,
602,
2103,
636,
2768,
1493,
512,
256,
28864,
220,
662,
59,
2484,
59,
1985,
65980
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48,
25,
28864,
3290,
1584,
5811,
22109,
358,
617,
3779,
390,
728,
478,
7345,
520,
279,
1890,
6352,
2237,
439,
856,
1296,
1052,
662,
578,
2262,
315,
856,
390,
728,
478,
7345,
551,
720,
1179,
28864,
271,
262,
711,
28864,
2962,
2091,
36435,
997,
286,
6871,
1388,
2091,
22274,
75,
498,
1957,
429,
4412,
498,
1520,
429,
1991,
5842,
907,
1158,
262,
571,
27819,
51636,
198,
262,
711,
12553,
4980,
997,
286,
471,
1715,
5539,
673,
2091,
22274,
75,
5240,
438,
2768,
374,
856,
1296,
1052,
711,
720,
256,
711,
220,
1296,
7,
416,
997,
286,
1194,
330,
9016,
5842,
551,
1034,
82,
32491,
416,
198,
286,
2105,
220,
15,
271,
4071,
602,
2103,
636,
2768,
1493,
512,
256,
28864,
220,
662,
59,
2484,
59,
1985,
65980,
-100
] |
Neàpolis (en grec antic Νεάπολις) era una ciutat de Cària entre Ortòsia i Afrodísies, al peu de les muntanyes de Cadme i propera a Harpasa. Pomponi Mela menciona una ciutat del mateix nom a la costa de Cària, i també Plini el Vell, que no pot ser la ciutat propera a Harpasa. Segurament es refereixen a Mindos, que quan va canviar de lloc la van anomenar Neàpolis.
Podria ser la moderna Jenibola prop d'Arpas Kalessi.
Referències
Ciutats de Cària | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 1,090 | [
128000,
8989,
6496,
10097,
285,
320,
268,
342,
2827,
88143,
101288,
31243,
75234,
100435,
104080,
46742,
8,
11639,
5203,
12088,
332,
266,
409,
356,
6496,
4298,
9465,
45440,
22980,
82,
689,
602,
13203,
24409,
24315,
552,
11,
453,
28800,
409,
3625,
296,
3935,
3852,
288,
409,
33160,
2727,
602,
6300,
64,
264,
5340,
79,
15790,
13,
39412,
621,
72,
386,
8458,
52618,
42790,
5203,
12088,
332,
266,
1624,
30276,
953,
9859,
264,
1208,
99802,
409,
356,
6496,
4298,
11,
602,
17834,
978,
1856,
6729,
658,
650,
616,
11,
1744,
912,
3419,
1446,
1208,
12088,
332,
266,
6300,
64,
264,
5340,
79,
15790,
13,
17652,
324,
2908,
1560,
40008,
953,
268,
264,
23754,
437,
11,
1744,
100809,
11412,
649,
69430,
409,
326,
1092,
1208,
5355,
459,
6431,
277,
4275
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
8989,
6496,
10097,
285,
320,
268,
342,
2827,
88143,
101288,
31243,
75234,
100435,
104080,
46742,
8,
11639,
5203,
12088,
332,
266,
409,
356,
6496,
4298,
9465,
45440,
22980,
82,
689,
602,
13203,
24409,
24315,
552,
11,
453,
28800,
409,
3625,
296,
3935,
3852,
288,
409,
33160,
2727,
602,
6300,
64,
264,
5340,
79,
15790,
13,
39412,
621,
72,
386,
8458,
52618,
42790,
5203,
12088,
332,
266,
1624,
30276,
953,
9859,
264,
1208,
99802,
409,
356,
6496,
4298,
11,
602,
17834,
978,
1856,
6729,
658,
650,
616,
11,
1744,
912,
3419,
1446,
1208,
12088,
332,
266,
6300,
64,
264,
5340,
79,
15790,
13,
17652,
324,
2908,
1560,
40008,
953,
268,
264,
23754,
437,
11,
1744,
100809,
11412,
649,
69430,
409,
326,
1092,
1208,
5355,
459,
6431,
277,
4275,
-100
] |
Pyaz ki kachori originated from Jodhpur. Although now, this spicy circular shaped fried dish is popular throughout Rajasthan and in fact the whole country. GiftJaipur only delivers products made in Desi Ghee.
1 Piece of Pyaaj kachori in each quantity. | {
"redpajama_set_name": "RedPajamaC4"
} | 88 | [
128000,
14149,
1394,
20548,
597,
613,
13915,
44853,
505,
622,
347,
21888,
324,
13,
10541,
1457,
11,
420,
48351,
28029,
27367,
41951,
12269,
374,
5526,
6957,
87440,
323,
304,
2144,
279,
4459,
3224,
13,
22837,
53545,
72977,
1193,
28421,
3956,
1903,
304,
3959,
72,
480,
50153,
627,
16,
30030,
315,
5468,
64,
1662,
597,
613,
13915,
304,
1855,
12472,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
14149,
1394,
20548,
597,
613,
13915,
44853,
505,
622,
347,
21888,
324,
13,
10541,
1457,
11,
420,
48351,
28029,
27367,
41951,
12269,
374,
5526,
6957,
87440,
323,
304,
2144,
279,
4459,
3224,
13,
22837,
53545,
72977,
1193,
28421,
3956,
1903,
304,
3959,
72,
480,
50153,
627,
16,
30030,
315,
5468,
64,
1662,
597,
613,
13915,
304,
1855,
12472,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
How did it get to be March already? Sorry. I have been atrocious about blogging and Must Try Harder. So what's been going on at Planet Kate?
Well – the blood test results came back and they weren't what the doctor or I was expecting, so it's off to see the endocrinologist next month to see if they can work out what we've missed. And in the meantime, as my blood sugar appears to be stable, I'm trying the 5:2 diet. Last week, I lost 1.5 lbs – and as that's the first weight I've lost since October (despite eating sensibly and exercising), I'm very pleased.
Oh - last thing - in the UK, it's publication week. So my ballroom dancing book is out in the shops now! | {
"redpajama_set_name": "RedPajamaC4"
} | 5,034 | [
128000,
4438,
1550,
433,
636,
311,
387,
5587,
2736,
30,
33386,
13,
358,
617,
1027,
58828,
1245,
922,
43092,
323,
15832,
9934,
11481,
261,
13,
2100,
1148,
596,
1027,
2133,
389,
520,
29935,
30301,
5380,
11649,
1389,
279,
6680,
1296,
3135,
3782,
1203,
323,
814,
15058,
956,
1148,
279,
10896,
477,
358,
574,
23132,
11,
779,
433,
596,
1022,
311,
1518,
279,
842,
91153,
16549,
1828,
2305,
311,
1518,
422,
814,
649,
990,
704,
1148,
584,
3077,
13942,
13,
1628,
304,
279,
33953,
11,
439,
856,
6680,
13465,
8111,
311,
387,
15528,
11,
358,
2846,
4560,
279,
220,
20,
25,
17,
10173,
13,
8155,
2046,
11,
358,
5675,
220,
16,
13,
20,
29160,
1389,
323,
439,
430,
596,
279,
1176,
4785,
358,
3077,
5675,
2533,
6664,
320,
5919
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
4438,
1550,
433,
636,
311,
387,
5587,
2736,
30,
33386,
13,
358,
617,
1027,
58828,
1245,
922,
43092,
323,
15832,
9934,
11481,
261,
13,
2100,
1148,
596,
1027,
2133,
389,
520,
29935,
30301,
5380,
11649,
1389,
279,
6680,
1296,
3135,
3782,
1203,
323,
814,
15058,
956,
1148,
279,
10896,
477,
358,
574,
23132,
11,
779,
433,
596,
1022,
311,
1518,
279,
842,
91153,
16549,
1828,
2305,
311,
1518,
422,
814,
649,
990,
704,
1148,
584,
3077,
13942,
13,
1628,
304,
279,
33953,
11,
439,
856,
6680,
13465,
8111,
311,
387,
15528,
11,
358,
2846,
4560,
279,
220,
20,
25,
17,
10173,
13,
8155,
2046,
11,
358,
5675,
220,
16,
13,
20,
29160,
1389,
323,
439,
430,
596,
279,
1176,
4785,
358,
3077,
5675,
2533,
6664,
320,
5919,
-100
] |
If you believed that headline and clicked on it because you thought that Mancunian shop Oi Polloi actually found mystical unicorns and skinned them for Clarks, then you're gullible and it's not our fault. But, if you clicked on it because those shoes are a fly, pixie-hued take on the classic Wallabee, then you're cool and we will reward you with a link to buy them over on Oi Polloi's site. Actually, it turns out that "unicorn leather" is a name given to elk hides by Oi Polloi's British tannery. Pretty magical. | {
"redpajama_set_name": "RedPajamaC4"
} | 3,281 | [
128000,
2746,
499,
11846,
430,
32263,
323,
20505,
389,
433,
1606,
499,
3463,
430,
386,
1149,
359,
1122,
8221,
507,
72,
3735,
67492,
3604,
1766,
69532,
88649,
44129,
323,
1940,
21203,
1124,
369,
2493,
7341,
11,
1243,
499,
2351,
342,
620,
1260,
323,
433,
596,
539,
1057,
14867,
13,
2030,
11,
422,
499,
20505,
389,
433,
1606,
1884,
15653,
527,
264,
11722,
11,
32674,
648,
2902,
3340,
1935,
389,
279,
11670,
9935,
80212,
11,
1243,
499,
2351,
7155,
323,
584,
690,
11565,
499,
449,
264,
2723,
311,
3780,
1124,
927,
389,
507,
72,
3735,
67492,
596,
2816,
13,
34863,
11,
433,
10800,
704,
430,
330,
93457,
18012,
1,
374,
264,
836,
2728,
311,
77942,
58704,
555,
507,
72,
3735,
67492,
596,
8013,
259,
1036,
727,
13,
36416,
24632
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
2746,
499,
11846,
430,
32263,
323,
20505,
389,
433,
1606,
499,
3463,
430,
386,
1149,
359,
1122,
8221,
507,
72,
3735,
67492,
3604,
1766,
69532,
88649,
44129,
323,
1940,
21203,
1124,
369,
2493,
7341,
11,
1243,
499,
2351,
342,
620,
1260,
323,
433,
596,
539,
1057,
14867,
13,
2030,
11,
422,
499,
20505,
389,
433,
1606,
1884,
15653,
527,
264,
11722,
11,
32674,
648,
2902,
3340,
1935,
389,
279,
11670,
9935,
80212,
11,
1243,
499,
2351,
7155,
323,
584,
690,
11565,
499,
449,
264,
2723,
311,
3780,
1124,
927,
389,
507,
72,
3735,
67492,
596,
2816,
13,
34863,
11,
433,
10800,
704,
430,
330,
93457,
18012,
1,
374,
264,
836,
2728,
311,
77942,
58704,
555,
507,
72,
3735,
67492,
596,
8013,
259,
1036,
727,
13,
36416,
24632,
-100
] |
The Great and Powerful Oz. Jake and the Neverland Pirates.
Disney Princess and the Frog. Go Go Pets/Zhu Zhu Pets. Toy Story I & II AND 3. Plush Toys & Bean Bag.
Winnie the Pooh & Friends. Hot Toys Games & Electronics. Blu-Ray DVD's & CD's.
Hot Wheels & Diecast Cars. Adventure Time W/ Finn & Jake. Disney It's a Small World. Disney Store D23 Art Of Jasmine Aladdin Snowglobe Genie Lamp Whole New World. D23 Expo Disney Store Art of Jasmine Collection.
This golden snowglobe takes the form of Genie's bejeweled Magic Lamp. Princess Jasmine and Prince Ali discover a whole new world of wonders on a Magic Carpet ride through the glass dome while you listen to their iconic theme. Fully sculptured snowglobe in the form of Genie's Magic Lamp. Shake to see a glittering sandstorm surround Princess Jasmine and Prince Ali in globe. Turn music key to hear. Non slip pads on base. Celebrating the return of Disney's. On DVD and Blu-ray disc. 8 1/2'' H x 5'' W x 11 1/2'' L.
Check out our great selection of D23 Expo exclusive. All items come from a smoke-free, pet free shop. All funds must be in U.
The item "Disney Store D23 Art Of Jasmine Aladdin Snowglobe Genie Lamp Whole New World" is in sale since Thursday, November 17, 2016. This item is in the category "Collectibles\Disneyana\Contemporary (1968-Now)\Snowglobes". The seller is "mostly_disney_r_us" and is located in Troutdale, Oregon. This item can be shipped worldwide. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,528 | [
128000,
791,
8681,
323,
75458,
36704,
13,
33172,
323,
279,
15037,
1974,
53505,
627,
72765,
30389,
323,
279,
72519,
13,
6122,
6122,
36986,
73060,
17156,
68844,
36986,
13,
22331,
15457,
358,
612,
8105,
3651,
220,
18,
13,
1856,
1136,
49481,
612,
34823,
20287,
627,
54,
99289,
279,
14128,
2319,
612,
23323,
13,
8166,
49481,
11871,
612,
38784,
13,
38869,
79504,
18584,
596,
612,
11325,
596,
627,
20780,
52549,
612,
8574,
3914,
36231,
13,
33112,
4212,
468,
14,
35162,
612,
33172,
13,
16795,
1102,
596,
264,
15344,
4435,
13,
16795,
9307,
423,
1419,
5277,
5046,
82452,
1708,
98106,
19435,
70,
64097,
9500,
648,
42277,
41593,
1561,
4435,
13,
423,
1419,
52423,
16795,
9307,
5277,
315,
82452,
11348,
627,
2028,
21411,
12056,
70,
64097,
5097,
279,
1376,
315,
9500,
648
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
8681,
323,
75458,
36704,
13,
33172,
323,
279,
15037,
1974,
53505,
627,
72765,
30389,
323,
279,
72519,
13,
6122,
6122,
36986,
73060,
17156,
68844,
36986,
13,
22331,
15457,
358,
612,
8105,
3651,
220,
18,
13,
1856,
1136,
49481,
612,
34823,
20287,
627,
54,
99289,
279,
14128,
2319,
612,
23323,
13,
8166,
49481,
11871,
612,
38784,
13,
38869,
79504,
18584,
596,
612,
11325,
596,
627,
20780,
52549,
612,
8574,
3914,
36231,
13,
33112,
4212,
468,
14,
35162,
612,
33172,
13,
16795,
1102,
596,
264,
15344,
4435,
13,
16795,
9307,
423,
1419,
5277,
5046,
82452,
1708,
98106,
19435,
70,
64097,
9500,
648,
42277,
41593,
1561,
4435,
13,
423,
1419,
52423,
16795,
9307,
5277,
315,
82452,
11348,
627,
2028,
21411,
12056,
70,
64097,
5097,
279,
1376,
315,
9500,
648,
-100
] |
Here at Caterquip, we pride ourselves at our ability to turn our hand to all commercial catering equipment. We take on bespoke projects from a small walk in fridge, to a dual fridge & freezer room, to a large warehouse style fridge or freezer. We build rooms using 80mm & 100mm insulated wall panels and roof & floor panels. Rooms can be fitted with either a reconditioned or brand new plant. We can also supply & fit wall mount monoblock and external remote compressor systems. Rooms start unclean but all panels will be deep cleaned, corners and joints will be sealed with fridge silicone and the floor will be clad with heavy duty checker plate panels. Once built and tested in our workshop, we shall dismantle and ship to the client site for final installation and commissioning. Call us for more information. 01733 286 000 Option Sales.
Refrigeration unit included. Well specified, excellent performance and this cold room can be used outside if sheltered from rain.
Top surface is 1.0mm special anti sliding stainless steels, lower surface is galvanized sheet panels which 42 density polyurethane are injected.
Racking & Installation can be quoted for accordingly. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,521 | [
128000,
8586,
520,
61236,
36847,
11,
584,
22519,
13520,
520,
1057,
5845,
311,
2543,
1057,
1450,
311,
682,
8518,
54929,
7241,
13,
1226,
1935,
389,
76649,
7224,
505,
264,
2678,
4321,
304,
38681,
11,
311,
264,
19091,
38681,
612,
50685,
3130,
11,
311,
264,
3544,
31212,
1742,
38681,
477,
50685,
13,
1226,
1977,
12295,
1701,
220,
1490,
3906,
612,
220,
1041,
3906,
79379,
7147,
21988,
323,
15485,
612,
6558,
21988,
13,
48403,
649,
387,
29441,
449,
3060,
264,
312,
9233,
291,
477,
6883,
502,
6136,
13,
1226,
649,
1101,
8312,
612,
5052,
7147,
6606,
1647,
677,
1039,
323,
9434,
8870,
59977,
6067,
13,
48403,
1212,
653,
18883,
719,
682,
21988,
690,
387,
5655,
28822,
11,
24359,
323,
35358,
690,
387,
19584,
449,
38681,
54025,
323,
279,
6558,
690
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
8586,
520,
61236,
36847,
11,
584,
22519,
13520,
520,
1057,
5845,
311,
2543,
1057,
1450,
311,
682,
8518,
54929,
7241,
13,
1226,
1935,
389,
76649,
7224,
505,
264,
2678,
4321,
304,
38681,
11,
311,
264,
19091,
38681,
612,
50685,
3130,
11,
311,
264,
3544,
31212,
1742,
38681,
477,
50685,
13,
1226,
1977,
12295,
1701,
220,
1490,
3906,
612,
220,
1041,
3906,
79379,
7147,
21988,
323,
15485,
612,
6558,
21988,
13,
48403,
649,
387,
29441,
449,
3060,
264,
312,
9233,
291,
477,
6883,
502,
6136,
13,
1226,
649,
1101,
8312,
612,
5052,
7147,
6606,
1647,
677,
1039,
323,
9434,
8870,
59977,
6067,
13,
48403,
1212,
653,
18883,
719,
682,
21988,
690,
387,
5655,
28822,
11,
24359,
323,
35358,
690,
387,
19584,
449,
38681,
54025,
323,
279,
6558,
690,
-100
] |
How Silicon Valley is finally growing up (sort of)
It's still the land of opportunity, but now it's confronting the human cost of its success. The new buzzwords: responsibility and empathy.
Fueled by snacks, energy drinks, and diet soda, students from Singapore's Nanyang Technological University develop ideas for an augmented reality app for photographers during a hackathon in Santa Clara.
ByMichelle Quinn
Photographs byLaura Morton
This story appears in the February 2019 issue of National Geographic magazine.
Teslas jockey for one of 12 electric-vehicle charging stations in the parking lot. A sea of mostly men gathers in the lobby of the Computer History Museum, some giving each other quick hugs. "How's my investment going?" one shouts to another across the room. A bell chimes, and it begins to feel like church. The boisterous crowd files quickly into the auditorium and becomes quiet. The doors close. Demo Day is about to begin.
Over the next two days, entrepreneurs from 132 start-ups pitch well-rehearsed two-minute spiels about how they are going to change the world. Turns out, there are countless ways to do that. Radar sensors on bedroom ceilings in nursing homes. Drones that check utility lines. Machine learning for cargo shippers. A laundry-detergent subscription service aimed at men.
On average there's a future billion-dollar company in every group, Michael Seibel, CEO and partner at Y Combinator, tells the Silicon Valley investors. "Your job is to figure out which one it is," he says. His firm helps entrepreneurs develop their ideas.
The first publicly traded U.S. company worth a trillion dollars, Apple has set the pace for innovation in Silicon Valley and continues to expand its influence. Its new headquarters building in Cupertino, which opened in 2017, is known as the "spaceship." About 12,000 employees work there, less than half of Apple's Bay Area staff. Recently Apple also has been a critic of Silicon Valley, advocating for customer privacy with jabs at other tech companies.
Photograph by CAMERON DAVIDSON
First up is Public Recreation, which offers group workouts in parking lots and other open spaces to exercisers who pay a subscription. "Our secret sauce is, we don't pay rent," says one of the founders.
Is that a big market, I wonder as everyone claps. And what about rain, snow, insects, and high-pollen-count days? But we're on to the next big idea—container optimization for ports using predictive algorithms. The hush in the room is respectful.
During my years as a reporter writing about Silicon Valley, I've learned to stifle the urge to guffaw at business ideas. Billions have been made on start-ups I dismissed as toys, solving problems I didn't know people had. Maybe if Plan A doesn't work, Public Recreation can switch to Plan B, like Justin.tv, which started by live-streaming the antics of one person, Justin, then anyone, and then turned into Twitch Interactive, which enables one to watch others play online games. In 2014, Amazon bought it for $970 million.
Maggie Ford, engineering director of the Stanford Solar Car Project, demos a solar car with her team at a September activities fair at Stanford University.
Silicon Valley is a place that is always "fleeing into the future," says Paul Saffo, a longtime Silicon Valley observer. The entrepreneurs pitching on this Demo Day paint a picture of lives made better by artificial intelligence, augmented reality, robots, drones, and sensors everywhere.
Silicon Valley's optimism and the pragmatic dreamers who keep it going have long fascinated me. But recently there's been a sobering-up of sorts.
Responsibility and empathy are the new buzzwords. Silicon Valley knows it is being held accountable for everything: the demographics of its workforce, the industries upended and the pain caused by technology, the hate spread faster because of its social networks, and even the effects of innovation on people here. Even some workers with six-figure incomes have trouble affording housing. And around the world in places such as Bolivia, mining the lithium needed to power the devices Silicon Valley invents is raising concerns about exploitation and the environment.
Technology rules the future, but there's also a grudging acknowledgment that sometimes in the pursuit of making things better and more efficient, you may be hurting people along the way.
"We are surrounded by people who are dreaming big," says Anne Wojcicki, co-founder and CEO of 23andMe, the personal-genomics and biotechnology firm. "The reality of Silicon Valley is on the right side of history—whether we like it or not, the world has changed. But those transitions can definitely be hard," she says. "I think we have a responsibility to all those places that are being impacted."
Everyone has a dream
"Where is Silicon Valley?" out-of-towners ask me when they visit. There's no capital city or ground zero. There's no Hollywood-like sign in the hills announcing Tech Town! With low mountain ranges to the east and west, Silicon Valley is a horseshoe-shaped flatland of offices and neighborhoods. Dazzling at the center are the waters of San Francisco Bay, indifferent to the roar of the traffic clogging the roads or the latest breakthrough from Elon Musk, the chief executive of Tesla and SpaceX. I point visitors to the Facebook thumbs-up "like" sign, next to the company's expanding headquarters. Facebook doesn't offer tours, nor do most tech companies.
New Facebook employee Nicole Voulgaropoulos and her mom, Sheryl Green-Voulgaropoulos, pose in front of Facebook's thumbs-up sign in Menlo Park as Mel Voulgaropoulos, her father, photographs them.
Of course, that "like" sign might not make everyone happy. We know Facebook's data policies failed to protect users after a researcher sold personal information that was later used to target us with political ads, and Russian operatives stoked political hostilities in the United States by using Facebook as a propaganda arm. Tech's epicenter might be the site in Mountain View where one of the inventors of the transistor started a company, a place that Apple co-founder Steve Wozniak visited just to touch the building and see the historical marker there. It can be found in a home on a cul-de-sac in Los Altos, where an Indian-born software engineer tucks her kids into bed and gets back online to work on her start-up. Or it can be found in a recreational vehicle with three flat tires parked near Stanford University, where Jim, a Marine Corps veteran and handyman, lives with his dog, Smokey, and bathes each day with hand wipes.
It's a much different place from what it was in 1982, when National Geographic wrote about Silicon Valley's "freewheeling egalitarianism that has replaced the rural pace" and said, "this dynamic growth happens behind a deceptively sedate facade … a monotone sprawl of low, rectangular buildings on which corporate nameplates display fusions of high-technology words that give few clues as to what goes on inside."
Along winding roads in the surrounding hills where deer feed, one can imagine the people here living at a rural pace. Once the home of apricot and plum orchards, the valley has just last year seen the shuttering of a landmark cherry stand and the closure of Orchard Supply Hardware, which was founded in San Jose during the Great Depression. Yet Silicon Valley can fool you: It looks egalitarian, open, and casual, with CEOs in hoodies and venture capitalists in bike shorts, and it is often whimsical, with workplaces that require people to remove shoes or allow them to bring their dogs.
But it's serious about its ambition. "People are more interested in your start-up than your actual name," complains Tristan Matthias, 24, an Australian visitor.
The seeds of Silicon Valley's appeal today began in the early 1990s. As a reporter arriving then, I thought the place felt kind of dead. The decline of the defense industry at the end of the Cold War and a downturn in the economy resulted in layoffs throughout California. The hot categories were desktop publishing, multimedia CD-ROMs, and video games.
Dressed as a mermaid, Heather Jenkins dances at a morning alcohol- and substance-free party in San Francisco, Daybreaker, designed to energize attendees for the workday.
Even the great rebel—Apple—seemed to be in decline. Steve Jobs was gone, having left in 1985 after a dispute with the CEO and board; his triumphant return to the company he founded would happen more than a decade later.
An idea was spreading in the mid-1990s: If people could be connected through computers, lives would change. I visited a school that was trying out connected computers with its students so teachers could send messages to parents through a dial-up modem. America Online appeared with its idea of a digital mall you could visit and order flowers from. It was clunky and hard to use, but something big was percolating.
There was a party happening to the north, in Seattle. Microsoft was making computers useful and becoming rich. In August 1995, Microsoft seemed like the winner in a winner-takes-all tech contest. Its executives danced at midnight outside electronics stores, celebrating the launch of the operating system Windows 95. Meanwhile a bomb of sorts was going off in Silicon Valley.
Australian Tristan Matthias spent a week working and living in the Startup Embassy (now closed), a shared "hacker house" in Palo Alto.
Netscape, which made "browser" software that allowed users to move around the internet, went public less than a year after its signature product was released. Although Netscape was an unproven company with pages of risks outlined for investors, its stock price closed at $58.25 on opening day, giving the company an instant market value of $2.9 billion.
Netscape's initial public offering (IPO) was the beginning of what came to be known as the dot-com boom, which saw the creation of great lasting companies such as Amazon and Yahoo!—as well as firms that cratered, such as Webvan and Pets.com.
Excitement over what could be done on the internet—sell makeup, rent trucks, find dates, and more—fueled a speculative stock market. In 1999 more than 400 companies, most of them tech related, went public.
Then the market crashed in 2000. More than 200,000 jobs were wiped out.
Embarrassment. Suffering. And yet: "All those start-ups were right," Wozniak, Apple's co-founder, told me. "They were all right about what the internet would do for us. It's just that you can't change your ways of life that quickly."
Silicon Valley has its own words that turn failure into something positive. "Iteration" means getting a product on the market without worrying about perfection—the tweaks can come later. "Pivoting" (said without embarrassment) is sharply changing course before the money runs out.
Failure and downturns clear the way for new ideas and new entrants. Google occupies part of what was once the site of Silicon Graphics, Inc., a computer company whose co-founder helped start Netscape. Facebook has updated the old Sun Microsystems campus as it has grown. The attempt to link the internet and television was a bumpy ride. But then YouTube showed up.
The social media era launched. Facebook co-founder Mark Zuckerberg moved to Palo Alto to grow Facebook with its hacker creed "Move Fast and Break Things." In San Francisco a group of friends and co-workers found a way for people to give updates throughout their day in 140 characters, and Twitter was born.
The great churn of Silicon Valley masks what happens to individuals. For many, innovation's great "creative destruction" cycles are not observed from 30,000 feet but are wrenching on a personal level. Jobs lost. Skills made obsolete. Households and families upended.
Left: Mykel Hall prepares dinner at his mother Patricia Carter's home in East Palo Alto. The house nearly went into foreclosure last year.
Right: Armore'Ray Stanley (center) plays with her nieces in a backyard in East Palo Alto. The house has more than doubled in value since Armore'Ray's mother, Patricia Carter, a UPS driver, bought it in 2003. But if she sold it, she couldn't afford to stay in the area and keep her family together.
Apple offered another template: the comeback. With Steve Jobs back in the driver's seat in 1997 after the company bought the other firm he started, NeXT, Apple began a slow recovery. The company released the iPod and then its digital entertainment store, iTunes. The iPhone launched in 2007, delivering on the promise of General Magic's Magic Cap and Apple's Newton more than 10 years earlier. Fast-forward to today, and tech companies are grappling with their dramatic impact on people's lives. Their leaders have been called to Congress to testify about the use of customer data, the ways foreign actors have used these prized technologies to disrupt elections, and potential bias in the algorithms that control what we see.
With the advent of artificial intelligence—computers learning to think like humans—data (with its partner, computational speed) has become the most important resource. The new oil. If computers can "think" one day and make decisions, then what?
After more than 3,000 of Google's employees signed a letter in protest, the company chose to not extend its contract with a Department of Defense project that uses artificial intelligence to analyze drone images. Then, in November, 20,000 Google employees worldwide walked out to protest the company's handling of sexual harassment and pay-equity issues. Salesforce created an Office of Ethical and Humane Use of Technology following criticism of its contract with U.S. Customs and Border Protection.
I visit John Hennessy, a former president of Stanford University and now chairman at Alphabet, the parent company of Google. He is congenial but not in a relaxed, academic way. The tech industry's current moment of reckoning is spurring deeper questions about Silicon Valley's purpose, he says.
"The tricky thing right now is for companies to figure out how they're going to take responsibility and govern themselves in ways that are seen as aligned with not just the interest of their shareholders but also the interest of society broadly," he says.
Left: Members of the Violet Society, a program for young women who want to build start-ups, network at a backyard event co-sponsored by Wefunder.
Right: Violet Society founder Shriya Nevatia's laptop attests to her interest in promoting women in technology. Nevatia started the society to help female and nonbinary entrepreneurs network and learn through peer-to-peer mentoring.
The start-up life
The young out-of-towners keep coming.
"You sit in a coffee shop and hear a pitch and people talking about crypto and Google, and that's a turnoff for some people. But I like it," says Shriya Nevatia, a product manager from upstate New York who left Boston after graduating from Tufts University.
In three years in Silicon Valley, Nevatia is on her third job. "It sounds bad, but I prefer tiny start-ups," she says.
In a leafy Palo Alto neighborhood, Joshua Browder sits poolside at the home where Facebook's Zuckerberg stayed in the summer of 2004 as the social media site was taking off. Inside the house, Browder's colleagues work at a dining room table on his company's app—DoNotPay—which is like a robot lawyer fighting parking tickets and finding price loopholes for airline and hotel bookings. The condition of the kitchen—a pan caked with tomato sauce—is just part of the gestalt of the hacker life: living, working, eating, and sleeping in one place as they race to launch the product. The past and present are entwined in tech legends—people who live, work, and invest in tech. Wozniak is a sought-after speaker, getting well over a thousand invitations a year. Part of his appeal is that he's the "other Steve" in Silicon Valley's favorite origin story, the creation of Apple. Woz, as he is known, may be a genius, but he sees himself as a regular guy. He retells one of the most famous stories about himself: Around the time of the company's IPO in 1980, he sold some of his Apple stock at pre-IPO prices to about 80 employees.
"I have a lot of concerns about the distribution of wealth," he says.
Andrew Kim works at the summer office of DoNotPay—in the same Palo Alto house rented by Facebook co-founder Mark Zuckerberg in 2004.
The 'bro culture' endures
This is Immigrant Valley today as much as Silicon Valley. The influx of foreign-born people is helping to offset an outflow to elsewhere in the U.S. In some fields, such as computers and mathematics, foreign-born workers now make up more than 60 percent of the workforce. The figure is even higher for women in those fields—78 percent are foreign-born. Indians, Chinese, and Vietnamese are the main groups of foreigners in the region's tech industry, but people come from dozens more countries: There were 42 people from Zimbabwe working in tech in 2015 and 106 from Cuba.
The international nature of Silicon Valley means companies, even small ones, have become a jumble of cultures and languages. But it also highlights who isn't making it into the Silicon Valley dream. On average African Americans and Latinos combined make up just 12 percent of the workforce at major tech firms. Women also are vastly underrepresented in what has been called Silicon Valley's "bro culture": Slightly more than 30 percent of the workforce at Google, Apple, and Facebook is female. A survey released last September found that women make up just 13 percent of start-up founders and hold only 6 percent of founder equity.
But women are also slowly gaining traction. In 2018, women made up 24 percent of technical jobs and 18.5 percent of firms' leadership, according to a survey of 80 U.S. companies by AnitaB.org, a nonprofit that works to increase women in tech fields.
When it comes to pay, women in tech are offered less than men more than 60 percent of the time for the same role (with an average gap of 4 percent), according to a report by Hired, a job-hiring firm. Major tech companies say they want more diverse teams, but it's hard to change employee demographics quickly.
"I've heard young women say Silicon Valley is bad for women, and they brace themselves for it," says Shriya Nevatia, the product manager, over a cup of tea. She has created a group called the Violet Society to help women and nonbinary people during the first 10 years they are in tech, to help get start-ups going. She's intrigued by the wide networks men have developed during college, through roommates, and in their early careers. Companies, seemingly founded through what seem like chance connections, actually arise from these networks. "We need more women for happenstance," says Nevatia, who wants to bring women together in the same way.
Imelda Valencia spent time living in a trailer parked on a friend's driveway, because her job cleaning houses in Atherton, one of the most expensive U.S. zip codes, pays barely $600 a week.
Photograph by MARY BETH MEEHAN
Squeezed by the boom
As out-of-towners continue to pour into Silicon Valley, driving up real estate and rental prices, many people here who aren't part of the tech economy—and some who are—see life becoming more difficult, mostly because of the rising cost of housing.
No place is perhaps more squeezed than East Palo Alto, a city of about 30,000 with formidable neighbors: Facebook is just to the north, and Google is to the south. For the past 50 years, the city largely has been a mixture of African-American and Latino families. Now new families, many white and Asian, are moving in. The median home price has already passed one million dollars—up from around $260,000 in 2011, according to Zillow. One million. That's what passes for affordable housing along the peninsula that stretches from San Francisco to San Jose.
For many longtime residents here who haven't enjoyed the current tech boom, rents have escalated, and buying a home is out of reach. They move out to the edges of the area, driving for hours each day to and from work. Or they move in with family and friends. Or they leave the area altogether. "They are building one-million-dollar homes right next to homeless shelters," says Pastor Paul Bains, who with his wife, Cheryl, runs a human-services nonprofit in East Palo Alto.
Patricia Carter lives in East Palo Alto and has a full house: her grown son, his three young daughters under four, and her daughter, plus her son's ex-partner, who lives in the garage and pays rent. Carter, a UPS driver, faced the threat of foreclosure on her three-bedroom ranch-style home, bought in 2003 for $447,000, but with help was able to save her home.
Michael Seibel, the CEO of Y Combinator, sees a roughly generational shift in Silicon Valley today. Younger workers want their companies to hire diverse employees and act with a bigger social conscience. Firms, desperate to hold on to talent, are falling in line.
And what about his purpose? After graduating from Yale University, Seibel planned to spend his 20s making money, his 30s being a parent, and his 40s going into politics. He moved to San Francisco in 2006 and started a company. He was co-founder and CEO of Justin.tv and Socialcam. Socialcam was sold to Autodesk in 2012, and Justin.tv eventually became Twitch Interactive. Now 36, he just became a father. But politics are out; he feels he has more social impact now.
If Silicon Valley has a spiritual center, it might be the Internet Archive, a nonprofit inside a former church in San Francisco. Servers churn away day and night, archiving much of the public web in its many forms. Nearly every Wikipedia article. About four million tweets a day. More than a half million YouTube videos a week. It's archived more than 340 billion web pages. The internet's lost and found.
Fog blowing in through open windows keeps the archive's servers from overheating.
Scattered among the pews in the archive's Great Room are more than 120 three-foot-high statues of people who have contributed at least three years to the archive. The internet's terra-cotta army. I recognize some of them in this eerie but powerful scene.
It's kind of creepy, these lifelike statues, some holding a book or a cup or a guitar, as if they were interrupted while working on a project or taking part in a sing-along. Or, perhaps, while arguing with each other about the right thing to do.
Michelle Quinn is the Silicon Valley bureau chief for Voice of America and has covered the region since 1994. San Francisco–based photographer Laura Morton is the winner of the 2018 Canon Female Photojournalist Award. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 6,181 | [
128000,
4438,
38250,
13345,
374,
5616,
7982,
709,
320,
7003,
315,
340,
2181,
596,
2103,
279,
4363,
315,
6776,
11,
719,
1457,
433,
596,
75867,
279,
3823,
2853,
315,
1202,
2450,
13,
578,
502,
31527,
5880,
25,
12014,
323,
48451,
627,
37,
361,
839,
555,
43402,
11,
4907,
21662,
11,
323,
10173,
39962,
11,
4236,
505,
21181,
596,
452,
3852,
526,
7146,
5848,
3907,
2274,
6848,
369,
459,
57088,
8903,
917,
369,
48277,
2391,
264,
17524,
24893,
304,
16376,
51657,
627,
1383,
83862,
41623,
198,
53304,
67132,
555,
77560,
73036,
198,
2028,
3446,
8111,
304,
279,
7552,
220,
679,
24,
4360,
315,
5165,
66542,
14756,
627,
75048,
14833,
503,
18369,
369,
832,
315,
220,
717,
9249,
12,
20347,
23468,
17789,
304,
279,
13217,
2763,
13,
362,
9581,
315
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
4438,
38250,
13345,
374,
5616,
7982,
709,
320,
7003,
315,
340,
2181,
596,
2103,
279,
4363,
315,
6776,
11,
719,
1457,
433,
596,
75867,
279,
3823,
2853,
315,
1202,
2450,
13,
578,
502,
31527,
5880,
25,
12014,
323,
48451,
627,
37,
361,
839,
555,
43402,
11,
4907,
21662,
11,
323,
10173,
39962,
11,
4236,
505,
21181,
596,
452,
3852,
526,
7146,
5848,
3907,
2274,
6848,
369,
459,
57088,
8903,
917,
369,
48277,
2391,
264,
17524,
24893,
304,
16376,
51657,
627,
1383,
83862,
41623,
198,
53304,
67132,
555,
77560,
73036,
198,
2028,
3446,
8111,
304,
279,
7552,
220,
679,
24,
4360,
315,
5165,
66542,
14756,
627,
75048,
14833,
503,
18369,
369,
832,
315,
220,
717,
9249,
12,
20347,
23468,
17789,
304,
279,
13217,
2763,
13,
362,
9581,
315,
-100
] |
Every one of these Squarespace templates seem like they were finished by means of an online design agency and they're updated you do away with any bugsas long because you aren't in programmer mode. Each Squarespace template includes all the components that are essential to have a solid search engine optimisation strategy without being too complicated. You can easily download this template at no cost and customise it according to choice. This template is rather straightforward to download and contains simple edit options also. There are lots of free printable templates easily available online. Do NOT use the specific same backgrounds which are in the template. Backgrounds You must use customized backgrounds.
It is possible to use routine on the grounds of needs. Before you decide on any pattern to be more mindful concerning how big your Jack. Pumpkin carving patterns are used to offer a vigorous horrible appearance to the complexion of the home.
You ought to be smooth from outside since it is going to help you to in dividing. A complete cake needs an perfect cake topper. The wedding rings are clearly one of the most essential portions of the wedding. The tone on the internet is a great deal darker. From time to time, focusing on that is all you should change the conversation on your head. If you consume all your kind words for yourself, try to quit talking. There are plenty of definitions of usability, and so long as you receive the idea, you don't need to worry about the semantics.
Perhaps, you have got to sit with this. Finishing things you've started is frequently a challenge, particularly when you're feeling discouraged. One of the things you are able to improvise on are wedding programs. Ideas can happen to anybody, anywhere! It is an amazing idea and all your guests will absolutely love it. Therefore, if you're able to demonstrate you own a feeling of entrepreneurship and understand how to build anything from the bottom up, it's a benefit.
Somebody who isn't practiced in SEO can take care of the system readily. There's an automatically generated sitemap that is built into the websites to assist Google crawl, index and rank a web site. Counting enjoys give us a feeling of satisfaction. The train was among the trendiest parts so that you don't have to overlook it. You can now also be a part of Harry Potter's magic world with the assistance of these awesome Free Fonts Templates fashions which were inspired by the novels. Such a complex notion and yet so straightforward to create! Thus, write a lot of stories and work on the prospective outcomes.
Our company isn't an individual, it is not who we are. Soon your characters development is going to end up a simple procedure. Thus, though our focus may have shifted, the most important problem has always been the specific same. Try to remember, achievement demands hard work, dedication, and total discipline. At the event you had a poor parenting experience, you might now point to the terrible father memory whenever you make a detrimental option.
The web is packed with all kinds of Harry Potter templates, and I'm sure you may find various invitation templates too. It's important that sites nowadays are constructed with different screen sizes and devices in your mind. Not having a site and relying on third-party websites might be appealing. It is literally produced in the pages of Harry Potter books, and it's handmade, meaning it comes in a variety of sizes and colors. Even the very best article can only assist you a lot in doing this.
Basically, it is similar to a profusion of little robots, built to progressively learn from every prior pair of robots, amassing an increasing number of data until it forms a complicated net of calculations representing the task it has built optimize. It's rather straightforward to learn anything today. What is more, depending on the project scope, the purchase price of constructing a product can virtually be zeroexcept for time and energy. As soon as you complete the purchase, you're likely to get the accessibility to the instantaneous download PDFs, and that usually means you won't need to wait around in order for it to get sent. Let's examine some of those other things folks are doing with cards.
Invitations are a rather important detail of the entire wedding ceremony. Additionally, you are likely to be informed about the approaching events in the game. Before you commence recruiting participants for testing, you must have a very clear idea about what you would like to test and it is you are running the study in the very initial place. There are a whole lot of methods to begin recruiting participants and it really depends upon the budget you have obtained and also the type of usability testing you'd like to perform. You might also attempt joining a set on idle, or alternative communities your character could possibly be a part of. For those items with couple of key words just 1 ad group was created.
No Relief in the Drugs Singapore laws are really strict while we speak about drugs even in plenty of instances it contributes to departure. Weight reduction may not be your topic of expertise, but do not worry. Obesity and associated ailments will be with us for several decades to come. If you become caught with the medication then it may even result in death. Utilize our healthcare resume samples to comprehend how to achieve that. Hence, it's always suggested to undergo a minumum of one time in the local laws of Singapore before having a trip.
Worker training on the internet is an important part of conducting a thriving modern organization. Promotion is a strong tool employed by manufacturers to advertise their products and solutions. It's thus extremely important to not just understand how to spot false advertising in business except to safeguard oneself from its own onslaught. Weight loss products could be advertised employing a retouched picture of a specific individual who claims to get used such an item. Wait till later to enquire about how much you're most likely to create as you may discover that the healthcare provider provides you with the very first amount to negotiate with. The specific same thing is true for any other business too. The nine people listed below are a couple of of the world's top social media influencers.
If you are trying to make a foundation letter covering several regions of expertise, you may need to use a bulleted format. When you are creating your healthcare cover letter, make sure to point your specialization. On occasion, a healthcare cover letter will be for a focused professional just like a direct service professional, which demands a very specific background. Crafting a cover letter to get yourself noticed by way of a healthcare employer isn't ever a simple undertaking. Regardless of the significance of the web, direct mail remains a strong way of getting your message across, especially if you're targeting nearby customers, prospects or companies.
Consider providing an internet poll to judge how your employees feel about the online training and the work all around. For new employees, online training is a wonderful way to make certain they are totally receiving the identical understanding. It may offer a great route for feedback. It will help make sure that everyone stays in the loop. The more the on-line training mimics the real job, the much better employees will have the ability to carry out. On-line learning is currently a billion-dollar industry. Because of this, it's important to teach the fundamentals of managing body weight, so everyone benefits.
A great deal of people opt not to crate train their puppy because they believe it's cruel. Evidently, your puppy is going to take a while to learn new, superior customs. Chris is one of the major content marketing experts in the uk and the creator and director of Content marketing Academy. He's constantly sharing excellent content which everybody in the marketing world should be following. CV has an important part for verifying your job. A superb CV is the initial requirement of ensuring fantastic interview.
At times, you need the support of a group environment to assist you propel yourself forward. Another added plus of cage training is that it reduces your puppy's anxiety! Among the advantages of mountain biking is that you're going to have an opportunity to enjoy incredible landscapes and natural attractiveness.
One in two people will end up fat from the following five years. You do not require the standard weight individual for a statistic. To make things worse, just one out of every 3 Americans say they are currently happy with where they're in life. There's no wonder a profession in healthcare can be an extremely rewarding one, however the practice of hunting for new job isn't always so enjoyable or rewarding.
There are lots of insurance carriers to address, however working with a reliable company will make certain you will be dealt with in case of any medical malpractice. It'll be OK if you record specific vital modules you have learnt. There are software tools available that will inform you the statistics of number and methods used by people to understand your site. Whatever the case, it is always much better to state what you can do, whatever software you use. A web-based training program is a cheap procedure to make sure your present employees stay happy and interested. There's an assortment of alternatives for insurance and you can select the one which you consider the best for the mountain biking program. Others may provide discounted insurance premiums.
Your timeline cover photo is the largest image on your page, your principal real-estate and you want to utilize it sensibly taking full advantage of the way that it is FREE. The picture increases curiosity, and also to discover more about it, you've got to purchase the magazine. The images you select for your ads wish to catch the attention of potential customers to make them need to click your ad. Too many pictures make a home seem bigger and brighter than it's actually, which contributes to a massive letdown when potential buyers show up for a viewing. Four easy techniques you're in a position to update your professional image. You want to be certain that when they click on your cover image, on the right-hand-side of this picture you have a description with a URL where they could receive your freebie.
Do not trust commercial products that will help you handle the epidermis. My health is indeed vital. A substantial portion of fulfilling your wellness and physical fitness goals is being in a position to keep a level head and focus on what it is you wish to do. The long-term benefits of healthful habits include decreased likelihood of cardiovascular disease, diabetes and much more. The ability to maintain adequate health and be free from any sort of ailments is a choice that you may make. It is not a huge secret that attaining a wholesome work-life balance is of utmost importance for everybody. The interview has a talk about the suggested foods that are helpful for your wellness. Obviously, you need to comprehend where you're right now on your wellbeing journey.
Make certain to keep bottles of plain water near so as to stay well hydrated during your journey. Water has an enormous part in your bowel movement. Rose Water is one of the most famous all-natural skin toners. It is essential to be cautious of the heat, however. For instance, you may walk round the house at that time that you are on the telephone instead of sitting and talking.
If a child weighs 100 lbs, the pack should not weigh at least 10 lbs. Narcissism if it is intense and unhealthy means a guy is wholly consumed in 1 self. Most men do not know that nourishment, not testosterone, is the essential hormone within the body. Even better, the idea of cooking a healthy meal is simply too dauntingthe fast food further down the road is a quicker and easier option for supper, especially with the mental and emotional energy necessary to just live our own lives! For some people, drinking a great deal of water assists about hydration and feeling energetic, but other may only be fulfilled with the inconvenience visiting the toilet over and over. Among the chief reasons individuals indulge in wholesome foods is that they are convenient and quick. Managing body image problems can be challenging and is a continuous process for people that struggle with this.
Don't neglect to exfoliate It is vital to eliminate dead skin cells which harm your skin feel and supply you a uneven skin tone. Because there are a lot of likely health benefits. Therefore, a few bottom lines apply for drinking enough water every day. It is a huge kind of healthy carbohydrates. When you maintain a healthier mental state, your entire body and lifestyle works a great deal better. In the event you have any suggestions on running great social media campaigns, do not hesitate to share them too!
As stated above, water consumption may differ from individual to individual. Get physical activity so that you may balance calories consumed with calories used, states Rivera. You're ready to burn up to 100 calories every day. As an instance, the healthiest diet can turn out to be somewhat counterproductive if your data about it is wrong or obsolete. For them, losing weight may not be a reasonable or wholesome aim. Some individuals have naturally higher metabolisms and could be a healthy weight whilst not needing particularly healthy habits. Prolonged exposure may also lead to dark spots or stains. Exposure to sunlight can harm your skin which may form wrinkles and fine lines. You do not need to have a health level to live a healthful lifestyle. In the interim,embracing these 10 practices for healthier living is a great place to get started. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,332 | [
128000,
11769,
832,
315,
1521,
20685,
5518,
1330,
20506,
2873,
1093,
814,
1051,
8220,
555,
3445,
315,
459,
2930,
2955,
9266,
323,
814,
2351,
6177,
499,
656,
3201,
449,
904,
23367,
300,
1317,
1606,
499,
7784,
956,
304,
48888,
3941,
13,
9062,
20685,
5518,
1330,
3896,
5764,
682,
279,
6956,
430,
527,
7718,
311,
617,
264,
6573,
2778,
4817,
7706,
8082,
8446,
2085,
1694,
2288,
17395,
13,
1472,
649,
6847,
4232,
420,
3896,
520,
912,
2853,
323,
2587,
1082,
433,
4184,
311,
5873,
13,
1115,
3896,
374,
4856,
31439,
311,
4232,
323,
5727,
4382,
4600,
2671,
1101,
13,
2684,
527,
10283,
315,
1949,
43095,
20506,
6847,
2561,
2930,
13,
3234,
4276,
1005,
279,
3230,
1890,
36576,
902,
527,
304,
279,
3896,
13,
25837,
82,
1472,
2011,
1005,
32789
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
11769,
832,
315,
1521,
20685,
5518,
1330,
20506,
2873,
1093,
814,
1051,
8220,
555,
3445,
315,
459,
2930,
2955,
9266,
323,
814,
2351,
6177,
499,
656,
3201,
449,
904,
23367,
300,
1317,
1606,
499,
7784,
956,
304,
48888,
3941,
13,
9062,
20685,
5518,
1330,
3896,
5764,
682,
279,
6956,
430,
527,
7718,
311,
617,
264,
6573,
2778,
4817,
7706,
8082,
8446,
2085,
1694,
2288,
17395,
13,
1472,
649,
6847,
4232,
420,
3896,
520,
912,
2853,
323,
2587,
1082,
433,
4184,
311,
5873,
13,
1115,
3896,
374,
4856,
31439,
311,
4232,
323,
5727,
4382,
4600,
2671,
1101,
13,
2684,
527,
10283,
315,
1949,
43095,
20506,
6847,
2561,
2930,
13,
3234,
4276,
1005,
279,
3230,
1890,
36576,
902,
527,
304,
279,
3896,
13,
25837,
82,
1472,
2011,
1005,
32789,
-100
] |
Nikolaj Ivanovič Ašinov (: Николай Иванович Ашинов; 1856 Caricyn – 1902) byl ruský dobrodruh a cestovatel, který se ke konci 80. let 19. století pokusil založit ruskou kolonii Sagallo.
Životopis
V roce 1883 odešel do Habeše, kde chtěl dosáhnout politického a církevního sblížení Habeše s Ruskou říší. Podařilo se mu navázat vztah s habešským císařem Janem IV. Etiopským, kterému se Ašinov představoval jako zástupce ruské vlády.
Ašinovova cesta do východní Afriky přivedla užitečné poznatky. V roce 1888 v Petrohradě totiž publikoval jazykovou příručku, která se zaobírala habešskou abecedou (dnes známá jako etiopské písmo) a taktéž vydal první habešsko-ruský slovník.
Po návratu do Ruska se začal nazývat "svobodným kozákem" a roku 1889 společně se skupinou dalších kozáků vedl expedici do Afriky, kde plánoval pokračovat v rozvíjení vřelých vztahů mezi Habeší a Ruskem. Kotvy spustil u pobřeží francouzského Somálska (dnešní Džibutsko), odkud se chystal později putovat až do Habeše. Tam posléze chtěl založit kolonii Nová Moskva, ale podařilo se mu založit jen menší koloniální osadu u zálivu Tadjoura, kterou nakonec musel s kozáky opustit kvůli vyvíjejícímu se tlaku ze strany Francie. Po pádu Nové Moskvy byl Ašinov i jeho skupina posláni do Ruska, kde byli obviněni z pirátství.
Na osobní pokyn cara Alexandra III. byli, po krátkém vyšetřování, všichni členové expedice deportováni do Oděsy. Pouze Ašinov byl poslán na tři roky na neznámé místo poblíž města Saratov, kde byl pod neustálým policejním dohledem.
Svých plánů se ale nevzdal. Později odjel do Paříže, kde se snažil sehnat skupinu dobrovolníků, se kterou by mohl opět odplout do Afriky. Roku 1891 odcestoval i do Londýna, odkud v srpnu poslal dopis carovi, kde nabídl své služby pro rozvoj a kolonizaci rozsáhlého území v Africe.
Galerie
Odkazy
Reference
Externí odkazy
Související články
Alžbětina pevnost
Fort Ross
Sagallo
Ruští cestovatelé
Narození v roce 1856
Úmrtí v roce 1902
Muži | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 388 | [
128000,
45,
1609,
337,
1662,
42521,
46188,
13453,
362,
11906,
258,
869,
30354,
111035,
127822,
127009,
34082,
57855,
12426,
119120,
26,
220,
9741,
21,
3341,
292,
1910,
1389,
220,
7028,
17,
8,
101302,
436,
33879,
20195,
656,
15222,
67,
102047,
264,
4194,
15539,
107164,
11,
101590,
513,
2004,
119628,
220,
1490,
13,
4194,
1169,
220,
777,
13,
4194,
34152,
1169,
2483,
120520,
321,
1167,
12812,
101271,
436,
33879,
283,
48219,
263,
3893,
55361,
37037,
382,
107881,
16471,
113101,
720,
53,
127634,
346,
220,
9367,
18,
73994,
105236,
656,
473,
8393,
58067,
11,
103431,
122428,
8924,
1995,
25105,
412,
3435,
105341,
264,
4194,
100641,
81,
441,
110114,
6292,
274,
2067,
2483,
104280,
473,
8393,
58067,
274,
117331,
33879,
283,
101819,
89950,
13,
393,
14320,
29432,
18536,
513,
12097,
8235
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
45,
1609,
337,
1662,
42521,
46188,
13453,
362,
11906,
258,
869,
30354,
111035,
127822,
127009,
34082,
57855,
12426,
119120,
26,
220,
9741,
21,
3341,
292,
1910,
1389,
220,
7028,
17,
8,
101302,
436,
33879,
20195,
656,
15222,
67,
102047,
264,
4194,
15539,
107164,
11,
101590,
513,
2004,
119628,
220,
1490,
13,
4194,
1169,
220,
777,
13,
4194,
34152,
1169,
2483,
120520,
321,
1167,
12812,
101271,
436,
33879,
283,
48219,
263,
3893,
55361,
37037,
382,
107881,
16471,
113101,
720,
53,
127634,
346,
220,
9367,
18,
73994,
105236,
656,
473,
8393,
58067,
11,
103431,
122428,
8924,
1995,
25105,
412,
3435,
105341,
264,
4194,
100641,
81,
441,
110114,
6292,
274,
2067,
2483,
104280,
473,
8393,
58067,
274,
117331,
33879,
283,
101819,
89950,
13,
393,
14320,
29432,
18536,
513,
12097,
8235,
-100
] |
Q: Finding the ratio of 5th of two different arithmetic sequences It is given that the ratio of the sum to the nth term of two different arithmetic sequences is $7n+2:n+3$.
Find the ratio of the 5th term of the sequences.
I have no idea where to start this pls help!
A: The 5th term, $a_5$ of any arithmetic sequence is the arithmetic mean of the 1st term, $a_1$ and the 9th term, $a_9$.
So we get $2a_5=a_1+a_9$
The sum to the 9th term is also $\frac{9}{2}(a+a_9)=9a_5$
So we get
$$S_9=9a_5$$
$$a_5=\frac{1}{9}S_9$$
So the ratio of the sums to the 9th term is
$$\frac{1}{9}(7(9)+2):\frac{1}{9}(9+3) =65:12$$
A: Setup:
Let the first sequence be $a+r(n-1)$ and let the second sequence be $b+s(n-1)$.
The partial sum of the first $N$ terms of these will be $aN + r\frac{N(N-1)}{2}$ and $bN + s\frac{N(N-1)}{2}$ respectively.
By factoring out an $N$ from both expressions, we find that the ratio of partial sums is $a+r\frac{N-1}{2}:b+s\frac{N-1}{2}$
We are told from the problem statement that this ratio can also be written as $7N+2:N+3$
For two ratios $A:B$ and $C:D$ to be equivalent, this means by definition that $AD=BC$ so by applying this to our problem, we learn that:
$$(a+r\frac{N-1}{2})(N+3) = (b+s\frac{N-1}{2})(7N+2)$$
This should hold for all values of $N$, including for example $N=1$. From $N=1$ we learn that $(4a) = (9b)$.
From using $N=2$ we learn that $(5a+\frac{5}{2}r) = (16b + 8s)$
From using $N=3$ we learn that $(6a + 6r) = (23b + 23s)$
Finally, from using $N=4$ we learn that $(7a + \frac{21}{2}r) = (30b + 45s)$
Now, with all of this we have found four equations involving our four unknowns $a,b,r,s$.
If there was a unique solution for $a,b,r,s$ we would be able to find them using Gaussian Elimination or Row Reduction, etc...
As it so happens, we cannot determine them uniquely, however we can determine them based on a single parameter which is good enough since we are not interested in the exact values of the sequences but rather the ratio of the fifth terms of the sequences.
We learn from row reduction that by letting $s$ be equal to a parameter $t$ that we have $(a,r,b,s) = (9t/2, 7t, 2t, t)$ and so the fifth terms of the sequences would be $9t/2 + 28t$ and $2t + 4t$ respectively and the ratio will be $65:12$.
A: Starting from JMoravitz's answer, consider
$$(a+r\frac{N-1}{2})(N+3) - (b+s\frac{N-1}{2})(7N+2)=0$$ Expand and group terms to get
$$\left(3 a-2 b-\frac{3 }{2}r+s\right)+ \left(a-7 b+r+\frac{5
}{2}s\right)N+\frac{1}{2} (r-7 s)N^2=0$$ and each coefficient must be $0$; so, three linear equations in $(a,b,r,s)$.
As also said in the same answer, using $N=1$ leads to $4a-9b=0$ and then the solution.
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 5,635 | [
128000,
48,
25,
43897,
279,
11595,
315,
220,
20,
339,
315,
1403,
2204,
35884,
24630,
1102,
374,
2728,
430,
279,
11595,
315,
279,
2694,
311,
279,
56229,
4751,
315,
1403,
2204,
35884,
24630,
374,
400,
22,
77,
10,
17,
19822,
10,
18,
3,
627,
10086,
279,
11595,
315,
279,
220,
20,
339,
4751,
315,
279,
24630,
627,
40,
617,
912,
4623,
1405,
311,
1212,
420,
87705,
1520,
0,
4815,
32,
25,
578,
220,
20,
339,
4751,
11,
400,
64,
62,
20,
3,
315,
904,
35884,
8668,
374,
279,
35884,
3152,
315,
279,
220,
16,
267,
4751,
11,
400,
64,
62,
16,
3,
323,
279,
220,
24,
339,
4751,
11,
400,
64,
62,
24,
3,
627,
4516,
584,
636,
400,
17,
64,
62,
20,
25222,
62,
16,
57939,
62
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48,
25,
43897,
279,
11595,
315,
220,
20,
339,
315,
1403,
2204,
35884,
24630,
1102,
374,
2728,
430,
279,
11595,
315,
279,
2694,
311,
279,
56229,
4751,
315,
1403,
2204,
35884,
24630,
374,
400,
22,
77,
10,
17,
19822,
10,
18,
3,
627,
10086,
279,
11595,
315,
279,
220,
20,
339,
4751,
315,
279,
24630,
627,
40,
617,
912,
4623,
1405,
311,
1212,
420,
87705,
1520,
0,
4815,
32,
25,
578,
220,
20,
339,
4751,
11,
400,
64,
62,
20,
3,
315,
904,
35884,
8668,
374,
279,
35884,
3152,
315,
279,
220,
16,
267,
4751,
11,
400,
64,
62,
16,
3,
323,
279,
220,
24,
339,
4751,
11,
400,
64,
62,
24,
3,
627,
4516,
584,
636,
400,
17,
64,
62,
20,
25222,
62,
16,
57939,
62,
-100
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.