text
stringlengths 14
5.22M
| meta
dict | __index_level_0__
int64 0
9.97k
| input_ids
sequencelengths 128
128
| attention_mask
sequencelengths 128
128
| labels
sequencelengths 128
128
|
---|---|---|---|---|---|
require "fileutils"
require "visual_studio"
module QtDeployWin
class Builder
def initialize(options)
@options = options
@errors = []
@visual_studio = VisualStudio.find("vs2013")
validate
end
def path(name)
case name
when :qt_dir, :dist_dir, :executable, :windeployqt_args
return @options[name]
when :windeployqt
qtdir = path(:qt_dir)
return nil unless qtdir
@windeployqt ||= which("windeployqt", "#{qtdir}/bin")
end
end
def errors
@errors
end
def valid?
@errors.empty?
end
def env
qtdir = path(:qt_dir)
{
"QTDIR" => qtdir,
"PATH" => "#{qtdir}/bin" + File::PATH_SEPARATOR + ENV["PATH"],
"VSINSTALLDIR" => @visual_studio.root,
"VCINSTALLDIR" => @visual_studio.toolsets.cpp
}
end
def build
raise "Task not valid, unable to exec" unless valid?
distdir = path(:dist_dir)
main_executable = path(:executable)
# Setup distdir
preapare_distdir(distdir)
# Copy main executable
dist_main_path = File.join(distdir, File.basename(main_executable))
FileUtils.cp main_executable, dist_main_path
# Package
args = path(:windeployqt_args) || []
system env, path(:windeployqt), dist_main_path, *args
end
protected
def preapare_distdir(distdir)
# Create distdir
FileUtils.mkdir_p distdir
# Clean distdir
FileUtils.rm_rf Dir["#{distdir}/*"]
end
def validate
qtdir = path(:qt_dir)
@errors << ":qt_dir is not set" unless qtdir
@errors << ":qt_dir not fould at \"#{qtdir}\"" unless qtdir && File.directory?(qtdir)
distdir = path(:dist_dir)
@errors << ":dist_dir is not set" unless distdir
@errors << ":dist_dir at \"#{qtdir}\" is already exists and not a directory" if distdir && File.exists?(distdir) && !File.directory?(distdir)
windeployqt = path(:windeployqt)
@errors << ":windeployqt is not set" unless windeployqt
@errors << ":windeployqt at \"#{windeployqt}\" is not fould" unless windeployqt && File.exists?(windeployqt)
main_executable = path(:executable)
@errors << ":executable is not set" unless main_executable
@errors << ":executable at \"#{main_executable}\" is not fould" unless main_executable && File.file?(main_executable)
@errors << "Visual Studio 2013 was not found" unless @visual_studio
end
def which(cmd, paths = ENV['PATH'])
pathext_env = ENV['PATHEXT']
exts = pathext_env ? pathext_env.split(';') : ['']
paths.split(File::PATH_SEPARATOR).each do |path|
exts.each do |ext|
exe = File.join(path, "#{cmd}#{ext}")
return exe if File.executable?(exe) && !File.directory?(exe)
end
end
nil
end
end
end
| {
"redpajama_set_name": "RedPajamaGithub"
} | 6,309 | [
128000,
4408,
330,
1213,
6159,
702,
4408,
330,
30318,
1284,
3310,
1875,
4450,
10817,
70564,
17400,
198,
220,
538,
21275,
198,
262,
711,
9656,
12349,
340,
415,
571,
2945,
284,
2671,
198,
415,
571,
7805,
284,
4260,
415,
571,
30318,
1284,
3310,
284,
20796,
32477,
2725,
446,
11823,
679,
18,
1158,
415,
9788,
198,
262,
842,
271,
262,
711,
1853,
3232,
340,
415,
1162,
836,
198,
415,
994,
551,
23913,
4432,
11,
551,
12489,
4432,
11,
551,
97024,
11,
551,
7678,
36894,
23913,
8550,
198,
286,
471,
571,
2945,
11174,
933,
415,
994,
551,
7678,
36894,
23913,
198,
286,
2874,
1320,
404,
284,
1853,
3964,
23913,
4432,
340,
286,
471,
2139,
7389,
2874,
1320,
404,
198,
286,
571,
7678,
36894,
23913,
36102,
902,
446,
7678,
36894,
23913,
498
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
4408,
330,
1213,
6159,
702,
4408,
330,
30318,
1284,
3310,
1875,
4450,
10817,
70564,
17400,
198,
220,
538,
21275,
198,
262,
711,
9656,
12349,
340,
415,
571,
2945,
284,
2671,
198,
415,
571,
7805,
284,
4260,
415,
571,
30318,
1284,
3310,
284,
20796,
32477,
2725,
446,
11823,
679,
18,
1158,
415,
9788,
198,
262,
842,
271,
262,
711,
1853,
3232,
340,
415,
1162,
836,
198,
415,
994,
551,
23913,
4432,
11,
551,
12489,
4432,
11,
551,
97024,
11,
551,
7678,
36894,
23913,
8550,
198,
286,
471,
571,
2945,
11174,
933,
415,
994,
551,
7678,
36894,
23913,
198,
286,
2874,
1320,
404,
284,
1853,
3964,
23913,
4432,
340,
286,
471,
2139,
7389,
2874,
1320,
404,
198,
286,
571,
7678,
36894,
23913,
36102,
902,
446,
7678,
36894,
23913,
498,
-100
] |
If you think that you have seen all the beautiful necklaces, wait till you see this beauty!
Cast in .925 Fine Sterling Silver, this Floral Beauty is graced by 90 pcs of 2.00mm genuine Emerald Rounds, 18 pcs of 3.00mm Genuine Emerald Rounds, and 36 pcs of 3.00mm Genuine White Topaz Rounds. The white topaz provide an elegant contrast to the adjacent Emeralds around the silver necklace.
If that was not enough, in the center of each of the 15 flowers is a genuine diamond for a total diamond weight of 0.15 Carats! (one in each of the 15 flowers)!
The combined genuine Emerald, White Topaz & Diamond carat weight of this awesome ensemble is 11.85 carats! That seems to be the formula for a great necklace that has to be seen to believe. The pictures just do not give justice to this beauty.
15 pcs of Genuine Diamond for a total Diamond Weight of 0.15 Carats!
Length of the Necklace: 20" | {
"redpajama_set_name": "RedPajamaC4"
} | 8,619 | [
128000,
2746,
499,
1781,
430,
499,
617,
3970,
682,
279,
6366,
13272,
77688,
11,
3868,
12222,
499,
1518,
420,
13444,
4999,
19235,
304,
662,
21910,
31253,
44835,
15347,
11,
420,
91752,
31685,
374,
1099,
4535,
555,
220,
1954,
71399,
315,
220,
17,
13,
410,
3906,
22785,
64196,
98923,
11,
220,
972,
71399,
315,
220,
18,
13,
410,
3906,
83982,
64196,
98923,
11,
323,
220,
1927,
71399,
315,
220,
18,
13,
410,
3906,
83982,
5929,
7054,
1394,
98923,
13,
578,
4251,
1948,
1394,
3493,
459,
26861,
13168,
311,
279,
24894,
64196,
82,
2212,
279,
15310,
55547,
627,
2746,
430,
574,
539,
3403,
11,
304,
279,
4219,
315,
1855,
315,
279,
220,
868,
19837,
374,
264,
22785,
22996,
369,
264,
2860,
22996,
4785,
315,
220,
15,
13,
868,
3341,
1900
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
2746,
499,
1781,
430,
499,
617,
3970,
682,
279,
6366,
13272,
77688,
11,
3868,
12222,
499,
1518,
420,
13444,
4999,
19235,
304,
662,
21910,
31253,
44835,
15347,
11,
420,
91752,
31685,
374,
1099,
4535,
555,
220,
1954,
71399,
315,
220,
17,
13,
410,
3906,
22785,
64196,
98923,
11,
220,
972,
71399,
315,
220,
18,
13,
410,
3906,
83982,
64196,
98923,
11,
323,
220,
1927,
71399,
315,
220,
18,
13,
410,
3906,
83982,
5929,
7054,
1394,
98923,
13,
578,
4251,
1948,
1394,
3493,
459,
26861,
13168,
311,
279,
24894,
64196,
82,
2212,
279,
15310,
55547,
627,
2746,
430,
574,
539,
3403,
11,
304,
279,
4219,
315,
1855,
315,
279,
220,
868,
19837,
374,
264,
22785,
22996,
369,
264,
2860,
22996,
4785,
315,
220,
15,
13,
868,
3341,
1900,
-100
] |
module.exports = {
directive: 'SYST',
handler: function () {
return this.reply(215);
},
syntax: '{{cmd}}',
description: 'Return system type',
flags: {
no_auth: true
}
};
| {
"redpajama_set_name": "RedPajamaGithub"
} | 4,918 | [
128000,
4450,
7587,
284,
341,
220,
34959,
25,
364,
18923,
790,
756,
220,
7158,
25,
734,
1754,
341,
262,
471,
420,
34953,
7,
12112,
317,
220,
1173,
220,
20047,
25,
43642,
8883,
3500,
756,
220,
4096,
25,
364,
5715,
1887,
955,
756,
220,
8202,
25,
341,
262,
912,
14341,
25,
837,
198,
220,
457,
2499,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
4450,
7587,
284,
341,
220,
34959,
25,
364,
18923,
790,
756,
220,
7158,
25,
734,
1754,
341,
262,
471,
420,
34953,
7,
12112,
317,
220,
1173,
220,
20047,
25,
43642,
8883,
3500,
756,
220,
4096,
25,
364,
5715,
1887,
955,
756,
220,
8202,
25,
341,
262,
912,
14341,
25,
837,
198,
220,
457,
2499,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Quetzacoatl epitomises the classic Snowmass styled herd-sire. His exceptionally strong Peruvian ancestry includes Hemingway, Vengador and Accoyocusani. Quetzacoatl has an ideal conformation and a truly amazing fleece that literally redefines the phrase staple definition. This guy has staples within staples and handle that is just sublime. He is without doubt the herd-sire for the forward-thinking breeder looking to introduce seriously low maturity coefficients or add that "finishing touch" to more established lines.
Snowmass Quetzacoatl is no longer standing at stud at Melford Green, but details are displayed for reference reasons for cria and pregnant females offered for sale. | {
"redpajama_set_name": "RedPajamaC4"
} | 7,884 | [
128000,
2232,
43289,
16833,
60435,
67422,
316,
5014,
279,
11670,
19435,
27428,
11343,
59213,
1355,
556,
13,
5414,
48298,
3831,
3700,
99712,
66004,
5764,
33924,
287,
3195,
11,
650,
833,
5477,
323,
11683,
2303,
3466,
5676,
13,
3489,
43289,
16833,
60435,
706,
459,
10728,
390,
1659,
323,
264,
9615,
8056,
93090,
430,
16280,
312,
58143,
279,
17571,
50056,
7419,
13,
1115,
7564,
706,
87929,
2949,
87929,
323,
3790,
430,
374,
1120,
71246,
13,
1283,
374,
2085,
10712,
279,
59213,
1355,
556,
369,
279,
4741,
100051,
5395,
7442,
3411,
311,
19678,
14243,
3428,
48261,
37929,
477,
923,
430,
330,
5589,
11218,
5916,
1,
311,
810,
9749,
5238,
627,
63385,
27428,
3489,
43289,
16833,
60435,
374,
912,
5129,
11509,
520,
1707,
520,
386,
491,
541,
7997,
11,
719,
3649,
527
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
2232,
43289,
16833,
60435,
67422,
316,
5014,
279,
11670,
19435,
27428,
11343,
59213,
1355,
556,
13,
5414,
48298,
3831,
3700,
99712,
66004,
5764,
33924,
287,
3195,
11,
650,
833,
5477,
323,
11683,
2303,
3466,
5676,
13,
3489,
43289,
16833,
60435,
706,
459,
10728,
390,
1659,
323,
264,
9615,
8056,
93090,
430,
16280,
312,
58143,
279,
17571,
50056,
7419,
13,
1115,
7564,
706,
87929,
2949,
87929,
323,
3790,
430,
374,
1120,
71246,
13,
1283,
374,
2085,
10712,
279,
59213,
1355,
556,
369,
279,
4741,
100051,
5395,
7442,
3411,
311,
19678,
14243,
3428,
48261,
37929,
477,
923,
430,
330,
5589,
11218,
5916,
1,
311,
810,
9749,
5238,
627,
63385,
27428,
3489,
43289,
16833,
60435,
374,
912,
5129,
11509,
520,
1707,
520,
386,
491,
541,
7997,
11,
719,
3649,
527,
-100
] |
A private university in Missouri that fired over 100 staff members amid budget woes in 2017 is now outfitting all of students residential spaces with personal smart speakers, and the school is refusing to say just how much it spent on the gadgets.
Saint Louis University in Missouri is outfitting all of its more than 2,300 student rooms with Amazon Echo Dots. The Echo Dot is "a voice-controlled speaker" that uses the virtual assistant Alexa to "play music, control smart home devices, make calls, answer questions, set timers and alarms, and more," according to Amazon.
"Every minute we can save our students from having to search for the information they need online is another minute that they can spend focused on what matters most: their education," Saint Louis University's Vice President David Hakanson said in an announcement.
The deployment of the Amazon devices comes after significant layoffs at the university last year. According to Fox 2 Saint Louis, in March of 2017, along with "massive budget cuts," Saint Louis University eliminated approximately 120 staff and administrative positions and removed 130 vacant positions. The cuts came following a $16 million deficit in the operating budget over the prior fiscal year.
Though the new Echo Dot program comes following those layoffs and budget crisis, the university would not reveal just how much it spent on the devices.
On Amazon.com, a new Echo Dot costs $49.99.
Asked about the long-term costs associated with the devices, Solomon said: "The cost to maintain this service is minimal and is covered in the IT budget without requiring additional funds from the University." Solomon told The Fix there were no more staff layoffs planned this year.
School officials did not respond to queries asking whether or not the school was still experiencing budget issues. In a report released in 2016, however, the university projected a significant budget shortfall for this year.
"Without implementing significant changes, an annual loss in the range of $10 to $20 million is projected through our bicentennial year (2018) and beyond," the report said.
Tuition at Saint Lous University runs around $43,000 per year. Room and board rates in the school's residence halls and apartments range from around $4,700 to over $7,200. | {
"redpajama_set_name": "RedPajamaC4"
} | 3,118 | [
128000,
32,
879,
12374,
304,
25378,
430,
14219,
927,
220,
1041,
5687,
3697,
23442,
8199,
77825,
304,
220,
679,
22,
374,
1457,
28403,
1303,
682,
315,
4236,
20658,
12908,
449,
4443,
7941,
22032,
11,
323,
279,
2978,
374,
39089,
311,
2019,
1120,
1268,
1790,
433,
7543,
389,
279,
54475,
627,
57475,
12140,
3907,
304,
25378,
374,
28403,
1303,
682,
315,
1202,
810,
1109,
220,
17,
11,
3101,
5575,
12295,
449,
8339,
38906,
423,
2469,
13,
578,
38906,
32362,
374,
330,
64,
7899,
41370,
19114,
1,
430,
5829,
279,
4200,
18328,
50712,
311,
330,
1387,
4731,
11,
2585,
7941,
2162,
7766,
11,
1304,
6880,
11,
4320,
4860,
11,
743,
45622,
323,
63411,
11,
323,
810,
1359,
4184,
311,
8339,
627,
1,
11769,
9568,
584,
649,
3665,
1057,
4236,
505
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
32,
879,
12374,
304,
25378,
430,
14219,
927,
220,
1041,
5687,
3697,
23442,
8199,
77825,
304,
220,
679,
22,
374,
1457,
28403,
1303,
682,
315,
4236,
20658,
12908,
449,
4443,
7941,
22032,
11,
323,
279,
2978,
374,
39089,
311,
2019,
1120,
1268,
1790,
433,
7543,
389,
279,
54475,
627,
57475,
12140,
3907,
304,
25378,
374,
28403,
1303,
682,
315,
1202,
810,
1109,
220,
17,
11,
3101,
5575,
12295,
449,
8339,
38906,
423,
2469,
13,
578,
38906,
32362,
374,
330,
64,
7899,
41370,
19114,
1,
430,
5829,
279,
4200,
18328,
50712,
311,
330,
1387,
4731,
11,
2585,
7941,
2162,
7766,
11,
1304,
6880,
11,
4320,
4860,
11,
743,
45622,
323,
63411,
11,
323,
810,
1359,
4184,
311,
8339,
627,
1,
11769,
9568,
584,
649,
3665,
1057,
4236,
505,
-100
] |
Q: How do I add or use the MAX Function to a Date field containing DateSerial function to query most recent date? I am using the DateSerial Function to convert the date on a column like this:
(DateSerial(CInt(Left([EXAMPLE_TBL.APP_DATE],4)),CInt(Mid([EXAMPLE_TBL.APP_DATE],5,2)),
CInt(Right([EXAMPLE_TBL.APP_DATE],2)))) AS Application_Date
The date comes from an Oracle linked table which is in a text datatype in Access. All is working, however, I need to add the MAX Function or find a way to get the most recent APP_DATE.
How do I add the MAX Function or what Function can I use so that if there are two APP_DATES, I get the most recent?
Thanks everyone!
A: This will change depending on what you really need to accomplish. If this is the only column you need to query then you should be able to do:
SELECT MAX((DateSerial(CInt(Left([EXAMPLE_TBL.APP_DATE],4)),CInt(Mid([EXAMPLE_TBL.APP_DATE],5,2)),
CInt(Right([EXAMPLE_TBL.APP_DATE],2))))
AS Application_Date FROM EXAMPLE_TBL;
On the other hand, if you need to query multiple columns you need to try something like this:
SELECT col1, col2, MAX(DateSerial(CInt(Left([APP_DATE],4)),CInt(Mid([APP_DATE],5,2)),CInt(Right([APP_DATE],2)))) AS Application FROM tablename GROUP BY col1, col2;
Is there a reason you are storing it as a text type rather than DateTime?
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 9,168 | [
128000,
48,
25,
2650,
656,
358,
923,
477,
1005,
279,
8498,
5830,
311,
264,
2696,
2115,
8649,
2696,
6040,
734,
311,
3319,
1455,
3293,
2457,
30,
358,
1097,
1701,
279,
2696,
6040,
5830,
311,
5625,
279,
2457,
389,
264,
3330,
1093,
420,
512,
20584,
6040,
3100,
1090,
7,
5530,
2625,
96975,
80518,
55653,
19007,
1145,
19,
5850,
34,
1090,
3269,
307,
2625,
96975,
80518,
55653,
19007,
1145,
20,
11,
17,
7110,
34,
1090,
2855,
492,
2625,
96975,
80518,
55653,
19007,
1145,
17,
26843,
5871,
7473,
40664,
271,
791,
2457,
4131,
505,
459,
22137,
10815,
2007,
902,
374,
304,
264,
1495,
47734,
304,
9742,
13,
2052,
374,
3318,
11,
4869,
11,
358,
1205,
311,
923,
279,
8498,
5830,
477,
1505,
264,
1648,
311,
636,
279,
1455,
3293,
18395,
19007
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48,
25,
2650,
656,
358,
923,
477,
1005,
279,
8498,
5830,
311,
264,
2696,
2115,
8649,
2696,
6040,
734,
311,
3319,
1455,
3293,
2457,
30,
358,
1097,
1701,
279,
2696,
6040,
5830,
311,
5625,
279,
2457,
389,
264,
3330,
1093,
420,
512,
20584,
6040,
3100,
1090,
7,
5530,
2625,
96975,
80518,
55653,
19007,
1145,
19,
5850,
34,
1090,
3269,
307,
2625,
96975,
80518,
55653,
19007,
1145,
20,
11,
17,
7110,
34,
1090,
2855,
492,
2625,
96975,
80518,
55653,
19007,
1145,
17,
26843,
5871,
7473,
40664,
271,
791,
2457,
4131,
505,
459,
22137,
10815,
2007,
902,
374,
304,
264,
1495,
47734,
304,
9742,
13,
2052,
374,
3318,
11,
4869,
11,
358,
1205,
311,
923,
279,
8498,
5830,
477,
1505,
264,
1648,
311,
636,
279,
1455,
3293,
18395,
19007,
-100
] |
Wealthiest ZIP code? Not 90210
Eddie HD April 11, 2014 119 Views
Where do America's wealthiest hang their ridiculously expensive hats? After working hard all day to purchase the universe, where do they relax in a gold-plated Jacuzzi?
Not in New York. Or San Francisco. Or Beverly Hills.
According to the Higley 1000, many of the country's richest residents live in neighborhoods off the beaten path. Increasingly, some of these areas are more racially diverse.
Newport Beach, Calif.
In the heart of the O.C., two neighborhoods in particular make the Higley 1000 list: Pelican Hill, ZIP code 92657, with its ocean views, and Cameo Shores, ZIP code 92625, with access to private beaches. The average income here is about $550,000, and in Pelican Hill, nearly 1 in 4 residents is nonwhite.
East Lake Shore Drive, Chicago
This area of historic luxury apartment buildings has been declared a historic landmark. To live here, in ZIP code 60611, you'll need an average income of nearly $600,000. Ethnically, it's still overwhelmingly white. African-Americans are the second-largest ethnic group, at a mere 2.5 percent.
Near Washington, DC
Shocker, several of the wealthiest neighborhoods are in suburbs of the nation's capital. Money + Power = America. There's Swinks Mill Road, an exclusive area of high-end homes in McLean, Va., 22102. Next door in Maryland, two areas of Potomac make the list—Carderock and Potomac Manors (a neighborhood made up of 42 custom-built homes). Wealthiest of all is a neighborhood in Bethesda called Bradley Manor, ZIP code 20817, where incomes average $599,400 and where over 3 percent of the population is now African-American, 5 percent is Latino and over 8 percent is Asian.
Coral Gables, Fla.
High-end homes dot a 15-mile stretch of Old Cutler Road south of Miami, including ZIP code 33157. Here, Latino residents are close to becoming a majority—47.7 percent, compared with 47.9 percent whites.
And the richest of all
The wealthiest neighborhood, according to the list, is the appropriately named "Golden Triangle" in Greenwich, Conn., ZIP code 06830. According to Forbes, this is home to some of the nation's richest Americans, people who put the "green" in Greenwich. Average incomes here top $610,000 a year.
"The relatively large number of Latinos found around the Burning Tree Country Club in Greenwich, Conn. (12.9 percent) is interesting," Stephen Higley wrote in his report, adding that incomes around the country club are roughly the same across ethnic groups. "Evidently this subset of Latinos have found the keys to the kingdom that is Greenwich."
Higley sifted through U.S. Census data and census area subdivisions where the mean income was more than $200,000 to create his ranking of the richest neighborhoods.
–Courtesy of Yahoo! Finance
Share this: Tell a Friend
2014americaFinancefinancehispaniclatinoNewsnewsone percentrichuswealthyzip code
Previous FL Governor Needs To Keep Anti-Latino Episode From Growing Further, Experts Say
Next Hispanic Business and Consumer Expo opened today
Eddie HD
LaMezcla.com Presents West Coast Vibes The Mixtape
DJ Inez – Latino Mix Mar 2019
Sech Featured as "Artist to watch for in 2019" on Pandora
Ratchetón "Que Lo Que" Music Video
J Alvarez – Hablame De Ti (Official Video)
Jose Vasquez October 12, 2015 | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 1,155 | [
128000,
1687,
1902,
13744,
57774,
2082,
30,
2876,
220,
21026,
605,
198,
36,
29554,
12445,
5936,
220,
806,
11,
220,
679,
19,
220,
9079,
25987,
198,
9241,
656,
5270,
596,
93118,
15020,
872,
73011,
11646,
45526,
30,
4740,
3318,
2653,
682,
1938,
311,
7782,
279,
15861,
11,
1405,
656,
814,
12234,
304,
264,
6761,
33207,
660,
15385,
79571,
5380,
2688,
304,
1561,
4356,
13,
2582,
5960,
13175,
13,
2582,
58774,
25964,
627,
11439,
311,
279,
473,
343,
3258,
220,
1041,
15,
11,
1690,
315,
279,
3224,
596,
57471,
11062,
3974,
304,
33100,
1022,
279,
31394,
1853,
13,
74540,
398,
11,
1063,
315,
1521,
5789,
527,
810,
75904,
17226,
627,
3648,
403,
13011,
11,
41889,
627,
644,
279,
4851,
315,
279,
507,
732,
2637,
1403,
33100,
304,
4040,
1304
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
1687,
1902,
13744,
57774,
2082,
30,
2876,
220,
21026,
605,
198,
36,
29554,
12445,
5936,
220,
806,
11,
220,
679,
19,
220,
9079,
25987,
198,
9241,
656,
5270,
596,
93118,
15020,
872,
73011,
11646,
45526,
30,
4740,
3318,
2653,
682,
1938,
311,
7782,
279,
15861,
11,
1405,
656,
814,
12234,
304,
264,
6761,
33207,
660,
15385,
79571,
5380,
2688,
304,
1561,
4356,
13,
2582,
5960,
13175,
13,
2582,
58774,
25964,
627,
11439,
311,
279,
473,
343,
3258,
220,
1041,
15,
11,
1690,
315,
279,
3224,
596,
57471,
11062,
3974,
304,
33100,
1022,
279,
31394,
1853,
13,
74540,
398,
11,
1063,
315,
1521,
5789,
527,
810,
75904,
17226,
627,
3648,
403,
13011,
11,
41889,
627,
644,
279,
4851,
315,
279,
507,
732,
2637,
1403,
33100,
304,
4040,
1304,
-100
] |
Co-operative Advantage
CO-OPERATIVE WORKING MAKES THE COMMUNITY
Economic & Social Benefit
Co-operative Business Solutions
Co-operatives East Midlands
More Than Just Profit
While there are many examples of co-operatives who do very well in achieving profits in today's business world, they exist for a much broader purpose. Co-operatives come in all shapes and sizes and they engage in a wide range of business activities, from retailing to agriculture, finance to social care and from housing to technology.
Co-operatives are built around a set of ethical values, commitments & principles such as self-help, community development, social responsibility, equality and solidarity, all principles of sustainability which have become highly relevant in today's world of work and the wider economy. They are initially formed to meet the needs of their active members, though help to serve people and businesses in other sectors.
We know that in the UK as many as 23% of the workforce are actively disengaged which will come to a high cost to any business. Using a methodology developed in the US, we estimate the cost of workforce disengagement to be around £36bn for the UK. Here is where a co-operative business model may be worth considering.
The benefits of the co-operative model lie in the degree of control, autonomy and ownership experienced by individuals. People become members of a co-operative and then help influence how it is run. Co-operatives put people first, positively impacting on people's values, sense of purpose, autonomy, motivation, creativity, well-being and skills. Co-operatives are at the cutting edge of social, socio-economic and environmental initiatives such as green energy, recycling, biodegradeable packaging and conservation, and have led the way in Fair Trade procurement.
Across the globe, the co-operative economy is worth £35.6 billion and has 13.5 million members.
We have added the Co-op Foundation Presentation on "Helping disadvantaged communities work together to make things better"
Click on the link below to see the presentation.
RCC conference
Our New Campaign Launches
#ThinkWiderThanJustYourself
You can make booking for Co-operatives East Midlands events from the Events page.
Co-operatives EMFollow
On a mission to promote, encourage, support and create a stronger Co-operative Movement across the East Midlands come join us it's free
AvatarCo-operatives EM@CoopsEastMid·
Co-operatives East Midlands wishes everyone a happy, healthy 2022 working together to promote co-operatives in all their forms @TanyaN_CEC @lincscoop @mycoopfood @coopseast @CoopNMC @CoopCymruWales @CooperativesWM @CooperativesUK @coopuk @thepeoplescoop
Retweet on TwitterCo-operatives EM Retweeted
AvatarLeicestershire Cares #TogetherWeCan@LeicsCares·
#FridayThoughts what sort of leader are you? How do we build bridges not walls? #TogetherWeCan
Join Together - Co-ops West Midlands 10 November 2021 free event will look at what climate change means for us all, and how cooperative models offer solutions. Book at http://www.cooperatives-wm.coop @lincscoop @coopseast @TanyaN_CEC @Cooperate29 @coopuk @mycoopfood @CoopsWales
Join Co-operatives East Midlands
Jenny de Villiers
Co-ops East Midlands Secretary
Email: [email protected]
Co-operatives East Midlands is "an unincorporated association".
Discover More on Our YouTube Channel
YouTube on Co-Op East Midlands | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 5,226 | [
128000,
7489,
90093,
71459,
198,
8445,
12,
47465,
24093,
32904,
1753,
72511,
1600,
3247,
52385,
57273,
198,
36,
32107,
612,
9983,
67450,
198,
7489,
90093,
8184,
23508,
198,
7489,
59655,
5983,
6460,
81251,
198,
7816,
34776,
4702,
58882,
198,
8142,
1070,
527,
1690,
10507,
315,
1080,
59655,
5983,
889,
656,
1633,
1664,
304,
32145,
22613,
304,
3432,
596,
2626,
1917,
11,
814,
3073,
369,
264,
1790,
27927,
7580,
13,
3623,
59655,
5983,
2586,
304,
682,
21483,
323,
12562,
323,
814,
16988,
304,
264,
7029,
2134,
315,
2626,
7640,
11,
505,
11040,
287,
311,
30029,
11,
17452,
311,
3674,
2512,
323,
505,
11983,
311,
5557,
627,
7489,
59655,
5983,
527,
5918,
2212,
264,
743,
315,
31308,
2819,
11,
42356,
612,
16565,
1778,
439,
659,
50570,
11,
4029,
4500,
11
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
7489,
90093,
71459,
198,
8445,
12,
47465,
24093,
32904,
1753,
72511,
1600,
3247,
52385,
57273,
198,
36,
32107,
612,
9983,
67450,
198,
7489,
90093,
8184,
23508,
198,
7489,
59655,
5983,
6460,
81251,
198,
7816,
34776,
4702,
58882,
198,
8142,
1070,
527,
1690,
10507,
315,
1080,
59655,
5983,
889,
656,
1633,
1664,
304,
32145,
22613,
304,
3432,
596,
2626,
1917,
11,
814,
3073,
369,
264,
1790,
27927,
7580,
13,
3623,
59655,
5983,
2586,
304,
682,
21483,
323,
12562,
323,
814,
16988,
304,
264,
7029,
2134,
315,
2626,
7640,
11,
505,
11040,
287,
311,
30029,
11,
17452,
311,
3674,
2512,
323,
505,
11983,
311,
5557,
627,
7489,
59655,
5983,
527,
5918,
2212,
264,
743,
315,
31308,
2819,
11,
42356,
612,
16565,
1778,
439,
659,
50570,
11,
4029,
4500,
11,
-100
] |
The cell cycle plays a crucial role in plant development. Organogenesis takes place throughout the lifetime and most cells maintain their ability to reenter and to regulate the cell cycle in response to a wide range of endogenous and external signals. In planta, phytohormones, particularly auxin and cytokinin, are essential for cell proliferation. New organs arise from local foci of proliferating cells, called meristems, which either persist or are de novo formed. In the organ primordium (initial stage of an organ before reaching maturity), cell differentiation starts with cell division arrest. These nondividing cells can exit the mitotic cycle with either complete loss or partial activity of the cell cycle. In the latter case, plant cells frequently enter an altered version of the cell cycle, known as endoreduplication cycles or endocycles, where the genome is duplicated without mitosis. Single or multiple rounds of endoreduplication cycles result in the formation of polyploid cells. The physiological role of ploidy is poorly understood.
Cell cycle progression is controlled by ordered action of cyclin-dependent kinases (CDKs), activated by defined cyclins, appearing for given periods in the cycle. When the function of a CDK-cyclin complex is accomplished, the associated cyclin partner becomes polyubiquitinated and destroyed by the ubiquitin-26S proteasome system (UPS). The vital importance of the UPS became evident during the last few years and its discovery was awarded by the Nobel Prize in Chemistry 2004 to Aaron Ciechanover, Avram Hershko, and Irwin Rose. The UPS is essential for many cellular processes including cell cycle, signal transduction and regulation of gene expression, circadian clocks, or phytohormone signaling pathways (Vierstra, 2003).
This Update focuses on the possible implications of the ubiquitin-mediated proteolysis in differential regulation of the cell cycle in plant development using nitrogen-fixing root nodules of Medicago truncatula as a model organ. Nodules develop on the roots of legume plants in symbiosis with Rhizobium soil bacteria. One can ask whether studies on this legume-specific symbiotic organ can provide general information on cell cycle and differentiation that is also valid for other plant organs. The answer is yes. The plant encodes nodule development, which resembles, in many respects, lateral root development. Moreover, nodules have several advantages over other plant organs. First, their development can be programmed by application of Rhizobium signal molecules, the Nod factors, which allows studying the mechanisms of cell cycle reactivation and meristem formation from the instant of addition of the morphogen signal. Second, Medicago nodules are indeterminate, which means that the meristem remains active and generates cells that constantly enter differentiation. Thus, different stages of development can be monitored even in a mature nitrogen-fixing nodule. Third, in the submeristematic cell layers, endoreduplication cycles occur permanently. Such a local concentration of endocycling cells is rare and ideal to elucidate the mechanisms that generate polyploid cells in plants. In the following, we concentrate on two critical steps of nodule development: (1) how cell cycle is activated; and (2) how proliferating cells exit the mitotic cycle and enter differentiation via endoreduplication cycles.
Nodule development requires active photosynthesis and limited nitrogen supply. There are two major nodule types: the indeterminate and determinate nodules with permanently or transiently active meristem that originate from the inner and outer cortex, respectively. Indeterminate nodule development (Fig. 1) has been studied mainly in the symbiosis of Medicago sativa/M. truncatula with Sinorhizobium meliloti and Pisum sativum/Trifolium repens with Rhizobium leguminosarum. In these plants, Nod factors elicit dedifferentiation and cell cycle reentry of the cortical cells in front of the protoxylem poles in the emerging root hair zone. Cell division in the inner cortex and in the pericycle below the activated cortical cells results in the formation of the nodule primordium and the vasculature, respectively (Yang et al., 1994). When the nodule primordium is formed and emerged from the root, it differentiates, generating a complex structure composed of different peripheral and central tissues (Vasse et al., 1990). The central region of a nitrogen-fixing nodule contains the persistent apical meristem zone I, the infection zone II, the nitrogen fixation zone III and, in old nodules, the proximal senescent zone IV (Fig. 1, N4). Infection of plant cells and differentiation of symbiotic cells take place in zone II. In this zone, the bacteria still produce Nod factors and, although the cells do not divide, they are able to undergo successive rounds of endoreduplication cycles. As a consequence, the nuclear DNA content increases from 2C up to 64C and, proportional to the genome size, the cells enlarge as they become older and more distant from the meristem (Cebolla et al., 1999). Zone III contains terminally differentiated giant plant cells hosting thousands of nitrogen-fixing bacteria, called bacteroids. The bacteroids stop Nod factor production and the expression of cell cycle genes is switched off. In contrast to zones I and II, the size of zone III increases during the lifetime of the nodule by continuous production of nitrogen-fixing cells.
Developmental stages of indeterminate-type nodule (N) and lateral root (LR) formation. The root zones competent for N or LR development are indicated on the longitudinal root section. Transverse section of the root (R) shows epidermis (Ep), cortex (C), endodermis (En), pericycle (P), phloem (Ph), and xylem (X). Colors indicate expression of cycA2 (red), 1-aminocyclopropane-1-carboxylate synthase (yellow), and ccs52A, the overlapping expression of cycA2 and ccs52A (green), and the position of protoxylem poles (brown). R + aux, auxin-treated root section.
Development of nodules and lateral roots displays common but also distinct features (Fig. 1). Both organs originate from de novo formed meristems initiated in front of the protoxylem/xylem poles. However, lateral roots develop from a more distal root zone than nodules and arise from division of pericycle cells. The lateral root primordium is smaller than the nodule primordium and it starts differentiation before its outgrowth from the root. Endoreduplication cycles also occur during lateral root development; however, only in a few cells and not exceeding the 8C ploidy level (Cebolla et al., 1999). In lateral roots, the vasculature is central, while in nodules the vascular bundles are branched and localized at the nodule periphery. Certain aberrant nodules display properties of both organs, such as the outgrowth of lateral roots from nodule-like structures where the nodule-specific meristem is overtaken by a lateral root meristem (Ferraioli et al., 2004).
Auxin is a key signal in plant development. The asymmetric distribution of auxin (termed auxin maxima) affects polarity and pattern formation and is required for embryonic, root, and shoot organogenic processes. Auxin is mobilized by auxin influx and efflux carriers, encoded by the AUX/LAX and PIN genes, respectively (Kramer, 2004). During lateral root development, division of pericycle founder cells and cell proliferation in the young lateral root primordium are auxin-dependent (Casimiro et al., 2003). At a later stage, the lateral root primordium becomes independent of externally applied auxin, indicating the existence of an internal auxin source.
Several studies suggest that Nod factors affect local distribution and concentration of auxin. The use of the auxin-sensitive GH3 promoter-reporter gene fusion indicated transient inhibition of auxin transport by rhizobia and Nod factors, leading to transient accumulation of auxin at the site where indeterminate root nodules initiate (Mathesius et al., 1998). In Lotus japonicus, which develops determinate nodules, a local up-regulation in auxin transport was detected in the root after inoculation with Nod factors and a strong GH3 promoter-β-glucuronidase expression was present in the dividing outer cortical cells leading to nodule primordium formation (Pacios-Bras et al., 2003). These results indicate that indeterminate and determinate type legumes might have different auxin distribution patterns that could lead to cell division either in the inner or outer cortex. In M. truncatula, expression studies on the AUX1-like genes suggest that auxin is required at two common stages of lateral root and nodule development, for the formation of primordia and differentiation of the vasculature (de Billy et al., 2001). Moreover, application of a polar auxin transport inhibitor resulted in the formation of pseudonodules (Hirsch et al., 1989). Cytokinin treatment of Medicago roots increased amyloplast accumulation and the number of cell division foci in the inner cortex recapitulating the responses to Nod factors (Bauer et al., 1996). Cytokinin has effects on the G1/S and G2/M transitions as well as on progression through S-phase (Dewitte and Murray, 2003). In L. japonicus, a legume forming determinate nodules, expression of the cytokinin-responsive ARR5 gene was absent in pericycle founder cells of lateral roots and at the initial divisions of cortical cells but was present in the nodule primordium (Lohar et al., 2004). This suggests that cytokinin is not needed for cell cycle reactivation, while it is necessary for maintaining cell proliferation. Or, local changes in cytokinin levels at the site of nodule initiation may alter auxin redistribution, thereby stimulating nodule organogenesis.
In the indeterminate legumes, ethylene provides positional information on cortical cell division. Expression of 1-aminocyclopropane-1-carboxylate synthase, encoding the last enzyme in ethylene biosynthesis, is localized to pericycle cells opposite to the phloem poles (Fig. 1, R; Heidstra et al., 1997). As ethylene inhibits division of cortical cells and nodule primordium formation, the absence of ethylene production in front of the xylem poles may explain why nodules or even lateral roots develop at the xylem but not at the phloem poles.
In eukaryotes, regulation of cell cycle has been attributed to the sequential activation of CDKs by cyclins. In Arabidopsis, 30 to 43 cyclins are predicted and the CDK family is composed of 12 proteins grouped in 6 types, from A to F (Vandepoele et al., 2002; Wang et al., 2004). The genome sequence of M. truncatula has not been completed yet; therefore, the exact numbers of cyclins and CDKs are not known but based on the identification of the six CDK types in Medicago (Magyar et al., 1997), similar complexity of the CDK-cyclin network is expected. The CDKs with the hallmark of PSTAIRE motif in the cyclin binding site are conserved in all eukaryotes. In plants, these are the A-type CDKs that express throughout the cell cycle and control both the G1/S and G2/M transitions, while the B-type CDKs are mitotic and plant specific (Fig. 2A). The C-type CDKs are involved in the regulation of transcription, whereas the D- and F-type CDKs are CDK-activating kinases.
A, Plant CDKs and cyclins control different phases of the mitotic cycle. B, Inhibition of mitotic CDKs converts the mitotic cycle to endocycle.
In the cell cycle, specific cyclins are associated with G1 (cyclin D), S-phase (cyclin E and cyclin A), and mitosis (cyclin A and cyclin B). Cyclin E is missing from plants, while other cyclin types are present and represented by multiple members. In Arabidopsis (Arabidopsis thaliana), there are 9 or 10 D-type cyclins, 10 A-type, and 9 B-type cyclins (Vandepoele et al., 2002; Wang et al., 2004). With the exception of a few plant cyclins, it is unknown when and where they are expressed and what their functions are.
By responding to nutrient and other signals, D-type cyclins are believed to have primary roles during G1 and G1-S transition. In Arabidopsis, cycD2 and cycD4 respond to sugar availability, while D3-type cyclins to cytokinin and brassinosteroid (Riou-Khamlichi et al., 1999, 2000). In Medicago roots, cycD3;1 was transiently induced in the reactivated cortical cells in response to Nod factors, while cycD3;2 expression was linked to endocycles in nodule zone II (Foucher and Kondorosi, 2000), indicating that different sets of CycDs may operate in mitotic and endocycles. Unlike in animals, specific CycDs in association with CDKBs act in G2-M (Kono et al., 2003).
The diversity of A-type cyclins is plant specific. In contrast to a single cyclin A in animal cells, plants have three groups of A-type cyclins with multiple members in each. A-type cyclins function from S- to M-phase, but some of them may control S-phase entry (Roudier et al., 2000; Menges et al., 2005). Expression of B-type cyclins is confined to G2-M and cyclin-B associated CDKs are required for mitosis. In the absence of mitotic CDK activities, cells stop to divide and either exit the mitotic cycle and become quiescent or enter endoreduplication cycle(s), which operates with G1-S-G2 activities of the cell cycle (Fig. 2B). If cell cycle activity is maintained for DNA replication and mitotic CDKs are inhibited, endoreduplication cycles can be repeated in multiple rounds leading to the formation of polyploid cells.
The presented CDK-cyclin centric view on cell cycle control is an extreme oversimplification. Many important components such as the Rb-E2F pathway or CDK inhibitors have not been discussed here, as this minimal information is sufficient to discuss nodule primordium formation and differentiation.
UPS is the primary mechanism in eukaryotic cells for degrading unwanted and misfolded proteins (Fig. 3A; Ciechanover et al., 2000). Through the cascade of the E1 ubiquitin activating, E2 ubiquitin conjugating, and E3 ubiquitin ligase enzymes, ubiquitin monomers are attached sequentially to the target proteins. The polyubiquitinated proteins are then recognized by the 26S proteasome, a large ATP-dependent multicatalytic protease, which removes the ubiquitin chain and degrades the proteins to short peptides. The UPS appears to be the most elaborate regulatory mechanism in plants as 5% of their genome encodes core components of UPS and more than 1,000 E3 ubiquitin ligases are predicted (for review, see Vierstra, 2003; Schwechheimer and Villalobos, 2004).
A, The ubiquitin proteasome system. The ubiquitin (Ub) is covalently attached to substrate proteins (Sub) through sequential action of the E1, E2, and E3 enzymes. The polyubiquitinated proteins are recognized by the 26S proteasome, which degrades the substrate proteins and recycles the ubiquitin. The E3 enzymes achieve the specificity of ubiquitin-dependent proteolysis. B, The SCF and the APC E3 enzymes are dedicated to basic cell-cycle control. Rbx/APC11 and Cullin/APC2 are related subunits. SCF is constitutively active, while the WD40-repeat proteins Cdc20 and Cdh1/Ccs52A,B activate APC from M-phase to S-phase. The cullin/APC2 and the Rbx/APC11 subunits are related. The substrate-specificity determinants (Ssd) are the F-box proteins in the SCF and Cdc20 and Cdh1/Ccs52A,B in the APC. In addition to polyubiquitination of cell cycle proteins, the SCF and the APC are also active in nonproliferating cells mediating protein degradation in various cellular processes. The SCF via different F-box proteins is involved in phytohormone signaling pathways.
The selection and specific timing of polyubiquitination of the target proteins are conferred by different E3 ubiquitin ligases. In the cell cycle, two structurally related multicomponent ubiquitin ligases, the anaphase-promoting complex (APC) and the Skp1/Cul1/F-box protein (SCF) complexes (Fig. 3B) have essential and complementary functions by temporally controlled degradation of various cell cycle proteins (Peters, 2002; Vodermaier, 2004).
Different F-box proteins provide the substrate-specificity of SCF. In Arabidopsis, the presence of almost 700 F-box proteins indicates the involvement of SCF in a wide range of cellular processes including various hormone responses. Auxin signaling is mediated by auxin-induced degradation of the Aux/IAA proteins by SCFTIR1, where TIR1 is an F-box protein (Gray et al., 1999, 2001). Elimination of the Aux/IAA proteins leads to the release of the interacting ARF transcription factors that regulate the expression of auxin responsive genes. In a similar way, in response to GA3, the SCFSLY1/2 mediates degradation of the putative transcription factors RGA and GAI (Dill et al., 2004; Fu et al., 2004), while SCFEBF1/2 is involved in ethylene signaling by degrading EIN3 in the absence of ethylene (Potuschak et al., 2003).
The APC is composed of 11 to 13 subunits in human and yeast (Saccharomyces cerevisiae) and homologous APC subunits have also been found in plants (Capron et al., 2003). Except for APC2 and APC11, relatively little is known about the role of the other APC subunits or the assembly of the complex. APC functions both in mitotic and nondividing postmitotic cells. Binding of the APC substrates and activation of the APC are controlled by 2 WD40-repeat activator proteins, Cdc20 and Cdh1. They determine stage-specific activation of the APC from metaphase until S-phase and degradation of various cell cycle proteins during the cell cycle (Harper et al., 2002; Peters, 2002). Cdc20 appears to be active only in proliferating cells. In contrast, Cdh1 functions in both mitotic and differentiating cells. In plants, there are multiple cdc20 genes and Cdh1-type activators, identified as cell cycle switch Ccs52 proteins (Cebolla et al., 1999). The latter form 2 classes: Ccs52A, representing a plant ortholog of the yeast and animal Cdh1 proteins; and Ccs52B, which is plant specific (Tarayre et al., 2004). These proteins differ in their expression pattern during the cell cycle and plant development (Tarayre et al., 2004) and interact with distinct sets of APC substrate proteins (Z. Kelemen, G. Horvath, and E. Kondorosi, unpublished data).
Mitotic cyclins that contain a destruction or D-box in their N terminus were the first identified substrates of the APC. Both the Cdc20 and the Cdh1/Ccs52 proteins can mediate the degradation of mitotic cyclins; however, at different phases of the cell cycle. A-type cyclins are not only substrates but also regulators of the APC as phosphorylation of Cdh1 by cyclin A-associated CDK inactivates Cdh1 and abolishes its binding to the core APC. Similarly, phosphomimetic amino acid replacements in the Medicago Ccs52A protein inhibit the interaction of Ccs52A with the APC (Tarayre et al., 2004). The Cdh1/Ccs52 proteins interact with many different proteins containing D-, KEN, A-, or GxEN boxes or other, yet unidentified degradation motifs and activate the APC both in and outside the cell cycle with essential roles in the differentiation of specific cell types. In plants, the number of APC substrates can be estimated from a few hundred up to a few thousand.
Previous studies showed that Nod factors trigger reactivation of G0-arrested cells (Savouré et al., 1994; Yang et al., 1994). Surprisingly, one of the earliest Nod factor induced cell cycle genes was a cyclin that, based on its structure, was classified as mitotic A2-type cyclin, cycA2 (Foucher and Kondorosi, 2000; Roudier et al., 2003). In the nodulation competent root zone, activation of cycA2 coincided with the induction of G1-S regulators (such as cycD3;1). Unlike other mitotic cyclins, the level of cycA2 mRNA and the protein did not display marked oscillation from late G1 until prometaphase where the CycA2 protein was abruptly degraded (Roudier et al., 2000). Expression of cycA2 in late G1 as well as its activation by the Nod factors suggested that CycA2 might be involved in the cell cycle reentry. This was studied in roots, lateral roots and nodules, and in galls, abnormal swellings of roots, where endoparasitic root-knot nematodes trigger division of cortical cells and formation of polyploid feeding cells (Roudier et al., 2003).
In the primary root, cycA2 expression was observed in the root apical meristem and faintly in the phloem cells (Fig. 1, R). cycA2 was induced at the onset of lateral root development, in the dividing cells and the lateral root primordium (Fig. 1, LR1 and 2). By differentiation of the primordium, cycA2 expression becomes restricted to the meristem (Fig. 1, LR3). During nodule organogenesis, cycA2 was induced 5 h after Nod factor treatment and the expression was maintained in the dividing cortical cells and in the nodule primordium (Fig. 1, N1–3). In nitrogen-fixing nodules, cycA2 was expressed only in the nodule meristem (Fig. 1, N4). In galls, expression of cycA2 was undetectable. Therefore, it is possible that the cycA2 function is linked to mitotic cycles, which lead to the formation of secondary meristems, but it is dispensable or even incompatible with endoreduplication cycles (Roudier et al., 2003).
If cycA2 is involved in cell cycle reentry during lateral root and nodule initiation, it is expected that its expression is regulated by auxin. The cycA2 promoter contains two auxin-response-like elements. Treatment of M. truncatula roots with auxin or with a polar auxin transport inhibitor demonstrated that cycA2 is indeed auxin regulated (Roudier et al., 2003). Auxin-treatment resulted not only in the up-regulation of cycA2 but affected also the spatial expression pattern. Instead of phloem-associated expression, auxin induced de novo transcription of cycA2 in front of the xylem poles, where both lateral roots and nodules initiate (Fig. 1, R and R + aux). This was also consistent with the Nod factor-triggered expression of the auxin-responsive GH3 promoter at the inner cortex prior to nodule initiation (Mathesius et al., 1998). It is still unknown, however, how this auxin response emerges on cycA2, which IAA protein(s) are degraded, and whether only the SCFTIR1 system or other E3 ubiquitin ligases are involved in auxin signaling in Medicago roots.
After the formation of the nodule primordium, the next critical step is nodule differentiation that involves cell cycle arrest in the various nodule cell types but modified regulation of the cell cycle in the symbiotic cells. This raises the questions of how cell proliferation is arrested, how endocycles are triggered, and whether genome amplification has any biological meaning. Endoreduplication cycles result in periodic replication of the genome. This is achieved by the loss of M-phase and oscillations in the activity of S-phase cyclin-dependent kinase.
In nodule zone II, expression of CDKA, G1-, and S-phase specific marker genes indicates that cell cycle activities for DNA replication and endoreduplication cycles are present (Foucher and Kondorosi, 2000). On the other hand, mitotic B-type cyclins are also expressed in the infected cells, albeit formation of mitotic cyclin-CDK complexes should be avoided during endocycles (Cebolla et al., 1999). How are the mitotic CDKs inactivated? Amongst many possible mechanisms, such as inhibitory phosphorylation of CDKs or binding of CDK inhibitors, mitotic CDKs can also be inactivated by destruction of the cyclin partner. This latter mechanism operates in nodules and involves the cell cycle switch gene ccs52A. Ccs52A binds and targets mitotic cyclins to the APC, resulting in their polyubiquitination and degradation (S. Tarayre, Z. Kelemen, and E. Kondorosi, unpublished data; Cebolla et al., 1999). In the absence of mitotic cyclins, the mitotic CDKs are inactive and M-phase progression as well as cell division is inhibited. If the cell cycle is otherwise active, the cells switch to endocycles entering directly G1-phase instead of M and synthesize the DNA in S-phase. If M-phase is blocked again by degradation of mitotic cyclins by APCCcs52A, the cells can enter a second or on a similar way repeated endoreduplication cycles (Fig. 2B).
The ccs52A gene is not expressed in the dividing cortical cells and in the growing nodule primordium. Ccs52A becomes activated in the fully grown primordium before differentiation and expresses in zones I and II of nitrogen-fixing nodules (Fig. 1, N3 and N4; Vinardell et al., 2003). The ccs52A mRNA and the Ccs52A protein are present in all endoreduplicating cells in zone II but absent in zone III (Cebolla et al., 1999; Vinardell et al., 2003). Inversely, ccs52B expression is present in the root and declines with the formation of nodule primordium.
As it was discussed before, phosphorylation by cyclin A-CDK inactivates the Cdh1-type APC activators. In human cells, depletion of cyclin A provoked a nonperiodic APC activity and endoreduplication cycles (Sorensen et al., 2000). It is unknown which cyclin A associated CDK regulates the activity of CCS52A in Medicago. It is tempting to speculate that it is CycA2. If this cyclin were a negative regulator of Ccs52A, its absence in nodule zone II, could lead to permanently unphosphorylated state of Ccs52A, providing constitutive APCCCS52A activity. Therefore, mitotic cyclins produced in zone II could be degraded at the instant of their production, generating multiple rounds of endocycles. This would also mean that CycA2 is dispensable for DNA replication and S-phase functions in the endoreduplicating cells, which are ensured by other A-type Medicago cyclins.
But why are the nodule cells polyploid? Will a nodule be functional without endocycles? This was tested in ccs52A antisense plants where reduction of the ccs52A transcript level did not affect the formation of nodule primordia but aborted nodule development (Vinardell et al., 2003). These nodules displayed significantly a lower degree of ploidy, and the nodule cells were smaller and poorly or not infected and contained no nitrogen-fixing cells. These results demonstrated that repeated endoreduplication cycles controlled by Ccs52A are indispensable for nitrogen-fixing nodule development (Vinardell et al., 2003). In the determinate nodules, the symbiotic cells are also big and polyploid. Ccs52A is highly conserved in legumes and present in nodules; therefore, Ccs52A likely mediates nodule ploidy in all nodule types.
During the past few years, enormous progress on the UPS highlighted the vital importance of this regulatory mechanism that turns off protein functions in the right place and at the right moment. Most knowledge on UPS arises from cell cycle studies where ordered destruction of proteins by the APC and SCF ensures unidirectional progression of the cycle. In plants, the discovery of the APC- and SCF-controlled processes is still at the elementary stage and out of hundreds or much more potential candidates, only a few are known as APC or SCF substrates. Future studies on the identification of novel targets and the APC- and SCF-regulated pathways will likely result in significant breakthroughs in understanding plant development. Data on degradation of plant cell cycle proteins are rather limited and it is unknown how hormone-signaling pathways communicate with the cell cycle. In M. truncatula, lateral root and nodule initiation depends on auxin maxima, formed de novo in front of the xylem/protoxylem poles and associated with the induction of an auxin-responsive cell cycle gene.
Studies on nodule organogenesis have led to the identification of the plant APC activators, Ccs52A and Ccs52B, as well as to the discovery of APCCcs52A-mediated degradation of mitotic cyclins as a key regulatory mechanism inducing and driving endoreduplication cycles. Though endoreduplication is widespread in plants, until recently its mechanism and biological significance of polyploidy were poorly understood. Are the endocycles the cause or the consequence of differentiation? Several studies suggest that increased genome size may control cell size and may be required for faster cell growth and for increasing the storing capacity of cells. In addition, the multiple gene copies and the lack of chromosome condensation may enhance transcriptional and metabolic activities in polyploid cells. In the case of nodules, the polyploid genome is essential for the development of nitrogen-fixing symbiotic cells. This is likely needed for extreme cell enlargement to host a vast quantity of bacteroids as well as to modify nodule metabolism for symbiotic nitrogen fixation. In the coming years, the genome sequence of M. truncatula, transcriptome, proteome, and metabolome analyses of polyploid cells are expected to shed light on the physiological roles of endocycles.
↵1 This work was supported by the Spanish Ministerio de Educación y Ciencia Progam Becas Postdoctorales en España y en el extranjero 2003 (to M.R.-N.). | {
"redpajama_set_name": "RedPajamaC4"
} | 3,148 | [
128000,
791,
2849,
11008,
11335,
264,
16996,
3560,
304,
6136,
4500,
13,
10995,
52379,
5097,
2035,
6957,
279,
19569,
323,
1455,
7917,
10519,
872,
5845,
311,
312,
1992,
323,
311,
37377,
279,
2849,
11008,
304,
2077,
311,
264,
7029,
2134,
315,
842,
53595,
323,
9434,
17738,
13,
763,
82765,
11,
37555,
998,
71,
494,
3233,
11,
8104,
10253,
258,
323,
83185,
65544,
11,
527,
7718,
369,
2849,
53840,
13,
1561,
36853,
31889,
505,
2254,
282,
2168,
315,
43036,
1113,
7917,
11,
2663,
4809,
380,
12116,
11,
902,
3060,
23135,
477,
527,
409,
39423,
14454,
13,
763,
279,
2942,
9036,
541,
2411,
320,
9613,
6566,
315,
459,
2942,
1603,
19261,
48261,
705,
2849,
60038,
8638,
449,
2849,
13096,
8163,
13,
4314,
2536,
614,
6714,
7917,
649,
4974,
279,
5568
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
2849,
11008,
11335,
264,
16996,
3560,
304,
6136,
4500,
13,
10995,
52379,
5097,
2035,
6957,
279,
19569,
323,
1455,
7917,
10519,
872,
5845,
311,
312,
1992,
323,
311,
37377,
279,
2849,
11008,
304,
2077,
311,
264,
7029,
2134,
315,
842,
53595,
323,
9434,
17738,
13,
763,
82765,
11,
37555,
998,
71,
494,
3233,
11,
8104,
10253,
258,
323,
83185,
65544,
11,
527,
7718,
369,
2849,
53840,
13,
1561,
36853,
31889,
505,
2254,
282,
2168,
315,
43036,
1113,
7917,
11,
2663,
4809,
380,
12116,
11,
902,
3060,
23135,
477,
527,
409,
39423,
14454,
13,
763,
279,
2942,
9036,
541,
2411,
320,
9613,
6566,
315,
459,
2942,
1603,
19261,
48261,
705,
2849,
60038,
8638,
449,
2849,
13096,
8163,
13,
4314,
2536,
614,
6714,
7917,
649,
4974,
279,
5568,
-100
] |
Jitterbugz cadishead PMOG is a free multiplayer online game you play with online allies and rivals while surfing the web. Harvest datapoints from URLs. Leave bombs or treasure on websites using Firefox.
Healthy shrimp recipes food network Barnard, George Gray 18631938; U.S. sculptorBarnard Ltd. Barnard Ltd is the web's number one source for Fake Food Artificial Food Display Food Plastic Food Fake Fruit Fake butterflies Chicago Movie Props.
Go grow glow foods list tagalog On the other hand, Annie Hall is unrelentingly hilarious, with the sweet romance between Alvie (Woody Allen) and Annie (Diane Keaton) often taking the back seat to a steady stream. Dissertation: 100gsm Paper \\alvie\DissertationPaper \\alvie\A3Mono \\alvie\ColourDissertationPaper \\alvie\A3Colour: Double sided is possible by selecting properties in the print.
Gas treatment reviews A book published by SKIRA, on the occasion of the exhibition InDepth: The House of Spiritual Retreat by Emilio Ambasz The Museum of Modern Art, New York November 23. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,471 | [
128000,
41,
3328,
2365,
89,
19973,
285,
2025,
5975,
12501,
374,
264,
1949,
39828,
2930,
1847,
499,
1514,
449,
2930,
20724,
323,
35938,
1418,
58840,
279,
3566,
13,
56935,
62823,
14737,
505,
36106,
13,
26257,
33606,
477,
32726,
389,
13335,
1701,
27018,
627,
97213,
56626,
19141,
3691,
4009,
23229,
569,
11,
10058,
24255,
220,
9714,
16874,
1987,
26,
549,
815,
13,
27863,
269,
33,
1923,
569,
12604,
13,
23229,
569,
12604,
374,
279,
3566,
596,
1396,
832,
2592,
369,
38065,
12369,
59294,
12369,
10848,
12369,
37108,
12369,
38065,
44187,
38065,
81776,
10780,
14270,
30406,
627,
11087,
3139,
37066,
15657,
1160,
4877,
32051,
1952,
279,
1023,
1450,
11,
53089,
11166,
374,
653,
3833,
306,
11559,
41367,
11,
449,
279,
10437,
30363,
1990,
1708,
64519,
320,
63862,
1094,
20661,
8
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
41,
3328,
2365,
89,
19973,
285,
2025,
5975,
12501,
374,
264,
1949,
39828,
2930,
1847,
499,
1514,
449,
2930,
20724,
323,
35938,
1418,
58840,
279,
3566,
13,
56935,
62823,
14737,
505,
36106,
13,
26257,
33606,
477,
32726,
389,
13335,
1701,
27018,
627,
97213,
56626,
19141,
3691,
4009,
23229,
569,
11,
10058,
24255,
220,
9714,
16874,
1987,
26,
549,
815,
13,
27863,
269,
33,
1923,
569,
12604,
13,
23229,
569,
12604,
374,
279,
3566,
596,
1396,
832,
2592,
369,
38065,
12369,
59294,
12369,
10848,
12369,
37108,
12369,
38065,
44187,
38065,
81776,
10780,
14270,
30406,
627,
11087,
3139,
37066,
15657,
1160,
4877,
32051,
1952,
279,
1023,
1450,
11,
53089,
11166,
374,
653,
3833,
306,
11559,
41367,
11,
449,
279,
10437,
30363,
1990,
1708,
64519,
320,
63862,
1094,
20661,
8,
-100
] |
British Law is a complex and rather broad subject. It is very much a matter for lawyers rather than laymen. However, instructors and their students do need to know a little about the legality of self-defence. What follows is very basic and in reality nothing more than a 'rule of thumb' guide.
First of all, please do understand that more people are convicted because of what they say that what they do. It is possible to defend yourself entirely within the law and still be prosecuted because, when interviewed, you come over as a psychopath rather than a decent person who was attacked without provocation.
It is important to be able to (truthfully) explain that you did not want to fight and tried to leave, talk the assailant down, or whatever (if the opportunity was allowed you) and only resorted to physical force when you genuinely believed there was no alternative. You also need to be able to show that the level of force you used was reasonable under the circumstances as you perceived them.
NB: "fighting" is not legal. Exchanging blows outside a pub or a football stadium over a difference of opinion or an unkind word is not legal. Self-defence is a legal within certain limits.
The law recognizes that a person who is under attack, or honestly believes that he or she – or someone nearby – is about to be attacked, has the right to use "reasonable force" to prevent or halt the attack. To quote Lord Griffith (1988) "If no more force is used than is reasonable to repel the attack, such force is not unlawful and no crime is committed".
The law also recognises that a person under attack cannot precisely calculate the absolute minimum of force required to halt the attack, nor can an ordinary civilian be expected to apply such minimum force effectively.
The law recognises that it is not wise to wait for an assailant to actually attack you. So long as you have been given very clear reason to believe that an attack is imminent, and you cannot otherwise resolve the situation (say by withdrawing), then you may attack pre-emptively. Similarly, you do not need to be attacked yourself in order to be justified in responding with violence. If an attack is underway or obviously imminent on any person nearby, you are legally allowed to use violence to prevent or to halt this attack.
Again, quoting Lord Griffith (1988), a person "…about to be attacked does not have to wait for his assailant to strike the first blow or fire the first shot, circumstances may justify a pre-emptive strike." However, if a pre-emptive strike takes place you are not allowed to strike maliciously or vindictively to get revenge after the danger has passed.
The law even recognises that at times it may be necessary to use a weapon or instrument to protect yourself. This is, as always, governed by the concept of "reasonable force".
If you honestly feel that you are under sufficient threat as to warrant an armed response, the law permits you to provide yourself with some kind of weapon or instrument. However, while you may choose to obtain a weapon in response to a clear and imminent threat, it is not justifiable to arm yourself "just in case" or to habitually go armed.
In addition, you are never justified in possessing a weapon for use in self-defence if the situation requiring its use is of your own making. That is to say, if you have been given reason to fear that someone might come to you with violent intent, then you may pick up or otherwise obtain a weapon. If, on the other hand you are going to confront someone, and bring along a weapon because you suspect that they may become violent, then this is very definitely not lawful since you are creating a situation in which you may have to use the weapon rather than attempting to avoid the possibility of violence or protect yourself from it.
You may be called upon to justify your actions in court, especially if you used a weapon or injured someone badly. However, a wise man once said that it is better to be tried by twelve than carried by six, and if you can show that you acted in good faith and conscience, out of concern for your safety or that of others, then the law is firmly on your side.
You do have certain duties imposed by law. First, and most importantly, you are required to remain within the bounds of common law. An attack on your person is not considered in any way to be "special circumstances". There are laws governing what you may and may not do, and you must adhere to them.
You are required to take reasonable steps to ensure the safety of your assailant once he is no longer a threat. This means that if you seriously injure someone, or render him unconscious, you must summon medical assistance. If possible, you should render first aid, but not if this would place you in additional danger. It is perfectly acceptable to flee the scene of the attack and call for an ambulance from a safe distance a few minutes later, if to remain would place you in danger.
You are also expected to inform the police of any incident where injury occurred. You may think that this is unwise, since it draws attention to the fact that you have hurt someone, but in fact it works in your favour, providing you remained within the law and the bounds of Reasonable Force. By reporting the matter to the police you are carrying out the role of a responsible citizen, something that criminals rarely do. If for any reason there are legal complications and the police do become involved, your statement is already on record and your correct behaviour noted. This can be very important if your assailant becomes involved in another fight later, and is injured, or if there is an attempt to cast doubt on your character.
Reasonable and Necessary Force The law in most countries is much the same in that it recognises that an individual has the right to use "reasonable and necessary force" to protect their own safety and that of the people around them. Reasonable force is also permitted in defence of property, but common sense must be applied here. There is little in your wallet or home worth being killed – or killing someone – over, and it could be argued that by violently opposing a burglar or other criminal you are deliberately and unnecessarily creating a situation where violence will probably ensue.
Whether it was possible to prevent it by non-violent means.
It is generally recognised that an individual coming suddenly under attack cannot be expected to gauge and to apply the precise minimum of force to end the assault, and that someone who is attacked is not responsible for bringing about that state of affairs; they are instead forced to take whatever violent measures they must in support of their recognised right to protect their own safety.
If you are dragged against your will into the world of the violent criminal then trying to behave "in a civilised manner" can get you hurt or killed. So you must forget about ideals like "never strike first" or "violence solves nothing" and do what you must to escape the situation.
You must match the threat with appropriate measures – however violent – and not hold back. If your life is in danger and the only way to preserve yourself is to cripple, blind or even kill someone, then that is what you must do. That, or choose to die - and our society has no right to expect you to do that! Violent criminals have little remorse and no honour. You must win (at least enough of a victory to escape) or they will do whatever they please to you.
And the law understands that. So long as you do not cease to act like a decent, reasonable citizen, then you are in the right.
If an attacker (or group of attackers) were clearly intent upon killing their victim (you or someone else), or were intent on doing something likely to result in death or permanent harm, then a considerable level of force is justifiable. Where someone poses a relatively minor level of threat, an attempt at restraint rather than "impact methods" is all that is reasonable. However it is important to understand that restraint will rarely work against a very violent, determined individual – it sometimes takes four or more trained police officers to restrain a struggling suspect – and common sense must be applied.
In essence, you have the right to use NECESSARY as well as REASONABLE force. You are not required to place yourself at unreasonable risk by remaining constrained by "rules of engagement" forbidding, say, punches to the head, or any such thing. You may do what you honestly believe is necessary to end the assault - and no more.
If your response is judged by a court, then an attempt will be made to establish the reasonableness of your response. The reasonableness of the level of force used is judged objectively. That is, your opinion of how much force must be used is not the one that counts. There is an accepted level of force associated with any given set of circumstances and if you did not remain within those limits then you will be found to have acted unlawfully.
However, where your opinion does matter is in the assessment of the circumstances that prevailed. A court will judge your response as reasonable or not based upon the circumstances as you perceived them. Thus while you are not permitted to use whatever degree of force you feel like, you are permitted to use a degree of force appropriate to the threat that you thought existed.
This has two important ramifications. First of all, it means that if you honestly believed that you were under, or about to come under, attack, and acted to protect yourself, then you have not committed a crime even if you were mistaken in that belief.
Secondly, it means that your assessment of the situation – likely made in a split second as violence erupted in your face – is used to judge the reasonableness of your response. The law recognises that a person under sudden and violent attack does not have complete information on the situation, nor time to determine the exact level of threat.
The reasonableness of your response is judged based on the situation as you perceived it at the time.
One thing is certain. You MUST stop your attack as soon as the opponent is no longer a threat.
Remember that in most cases of self-defence, there is no legal involvement and even if the police become involved, they will make a judgment as to whether legal proceedings should be undertaken. If it is clear that you acted as a reasonable, responsible citizen, within the bounds of necessary force, then there has been no crime (on your part) and it is extremely unlikely that charges will be brought against you.
This is particularly true if you can demonstrate that you tried to avoid or defuse the incident, then acted only in self-defence, even going so far as to summon medical assistance for your injured assailant. Remember also that the average street thug holds the police in contempt. He is unlikely to attempt legal redress if he is hurt by his intended victim.
Thoughts of courtrooms and juries should not be foremost in your mind while defending yourself. Be aware of the need to use only necessary force, but don't hold back from doing what you must. It is better to explain to a police officer or a court why you were forced to harm someone, than to be killed because you were unwilling to resist effectively or – worse – because you feared you might be punished for it. Remember that there exists absolutely no "Principle of Minimum Force" – you have the right to use "ALL REASONABLE AND NECESSARY FORCE", which is rather different.
Having said all of this, the whole can of worms stays firmly unopened if you can avoid conflict in the first place. This is why we teach self-protection as a wider subject, within which self-defence is the physical component. Most violent situations are avoidable if you know how to deal with them. Confrontation management, evasion, avoidance, defusion and so on are all valid ways to protect yourself and form an important part of what we teach. However good at physical self-defence you are, things can go wrong.
If you managed to avoid violence altogether then you can't possibly lose. | {
"redpajama_set_name": "RedPajamaC4"
} | 36 | [
128000,
52961,
7658,
374,
264,
6485,
323,
4856,
7353,
3917,
13,
1102,
374,
1633,
1790,
264,
5030,
369,
21866,
4856,
1109,
11203,
5794,
13,
4452,
11,
54918,
323,
872,
4236,
656,
1205,
311,
1440,
264,
2697,
922,
279,
89846,
315,
659,
29899,
768,
13,
3639,
11263,
374,
1633,
6913,
323,
304,
8903,
4400,
810,
1109,
264,
364,
13233,
315,
25015,
6,
8641,
627,
5451,
315,
682,
11,
4587,
656,
3619,
430,
810,
1274,
527,
23959,
1606,
315,
1148,
814,
2019,
430,
1148,
814,
656,
13,
1102,
374,
3284,
311,
10726,
6261,
11622,
2949,
279,
2383,
323,
2103,
387,
58559,
1606,
11,
994,
30147,
11,
499,
2586,
927,
439,
264,
8841,
36211,
4856,
1109,
264,
15326,
1732,
889,
574,
18855,
2085,
2605,
2328,
627,
2181,
374,
3062,
311,
387
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
52961,
7658,
374,
264,
6485,
323,
4856,
7353,
3917,
13,
1102,
374,
1633,
1790,
264,
5030,
369,
21866,
4856,
1109,
11203,
5794,
13,
4452,
11,
54918,
323,
872,
4236,
656,
1205,
311,
1440,
264,
2697,
922,
279,
89846,
315,
659,
29899,
768,
13,
3639,
11263,
374,
1633,
6913,
323,
304,
8903,
4400,
810,
1109,
264,
364,
13233,
315,
25015,
6,
8641,
627,
5451,
315,
682,
11,
4587,
656,
3619,
430,
810,
1274,
527,
23959,
1606,
315,
1148,
814,
2019,
430,
1148,
814,
656,
13,
1102,
374,
3284,
311,
10726,
6261,
11622,
2949,
279,
2383,
323,
2103,
387,
58559,
1606,
11,
994,
30147,
11,
499,
2586,
927,
439,
264,
8841,
36211,
4856,
1109,
264,
15326,
1732,
889,
574,
18855,
2085,
2605,
2328,
627,
2181,
374,
3062,
311,
387,
-100
] |
package com.datumbox.framework.core.common.text.extractors;
import java.util.LinkedHashMap;
import java.util.LinkedHashSet;
import java.util.Map;
import java.util.Set;
/**
* This extractor class extracts the unique keywords of a string as a sequence of words.
* Keywords that already appeared at the beginning of the string, do not reappear
* in the returned sequence more than once.
*
* @author Vasilis Vryniotis <[email protected]>
*/
public class UniqueWordSequenceExtractor extends AbstractTextExtractor<UniqueWordSequenceExtractor.Parameters, Integer, String> {
/**
* AbstractParameters of the UniqueWordSequenceExtractor.
*/
public static class Parameters extends AbstractTextExtractor.AbstractParameters {
private static final long serialVersionUID = 1L;
}
/**
* Public constructor that accepts as arguments the AbstractParameters object.
*
* @param parameters
*/
public UniqueWordSequenceExtractor(Parameters parameters) {
super(parameters);
}
/**
* This method gets as input a string and returns as output a numbered sequence
* of the unique tokens. In the returned map as keys we store the position of the word
* in the original string and as value the actual unique token in that position.
* Note that the sequence includes only the position of the first occurrence of
* each word while the next occurrences are ignored.
*
* @param text
* @return
*/
@Override
public Map<Integer, String> extract(final String text) {
Set<String> tmpKwd = new LinkedHashSet<>(generateTokenizer().tokenize(text));
Map<Integer, String> keywordSequence = new LinkedHashMap<>();
int position = 0;
for(String keyword : tmpKwd) {
keywordSequence.put(position, keyword);
++position;
}
return keywordSequence;
}
}
| {
"redpajama_set_name": "RedPajamaGithub"
} | 7,786 | [
128000,
198,
1757,
470,
10116,
372,
2054,
21672,
4976,
6488,
2858,
38458,
1105,
401,
475,
1674,
2013,
78547,
19004,
280,
475,
1674,
2013,
78547,
45701,
280,
475,
1674,
2013,
10312,
280,
475,
1674,
2013,
4296,
401,
1784,
353,
1115,
68572,
538,
49062,
279,
5016,
21513,
315,
264,
925,
439,
264,
8668,
315,
4339,
627,
353,
56795,
430,
2736,
9922,
520,
279,
7314,
315,
279,
925,
11,
656,
539,
312,
41866,
720,
353,
304,
279,
6052,
8668,
810,
1109,
3131,
627,
1235,
353,
571,
3170,
650,
30149,
285,
650,
894,
7907,
354,
285,
366,
65,
1347,
6729,
354,
285,
31,
57033,
2054,
916,
397,
740,
898,
538,
29750,
11116,
14405,
57218,
2289,
13822,
1199,
57218,
27,
23657,
11116,
14405,
57218,
13361,
11,
4540,
11,
935,
29,
341,
1084,
262
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
198,
1757,
470,
10116,
372,
2054,
21672,
4976,
6488,
2858,
38458,
1105,
401,
475,
1674,
2013,
78547,
19004,
280,
475,
1674,
2013,
78547,
45701,
280,
475,
1674,
2013,
10312,
280,
475,
1674,
2013,
4296,
401,
1784,
353,
1115,
68572,
538,
49062,
279,
5016,
21513,
315,
264,
925,
439,
264,
8668,
315,
4339,
627,
353,
56795,
430,
2736,
9922,
520,
279,
7314,
315,
279,
925,
11,
656,
539,
312,
41866,
720,
353,
304,
279,
6052,
8668,
810,
1109,
3131,
627,
1235,
353,
571,
3170,
650,
30149,
285,
650,
894,
7907,
354,
285,
366,
65,
1347,
6729,
354,
285,
31,
57033,
2054,
916,
397,
740,
898,
538,
29750,
11116,
14405,
57218,
2289,
13822,
1199,
57218,
27,
23657,
11116,
14405,
57218,
13361,
11,
4540,
11,
935,
29,
341,
1084,
262,
-100
] |
LISTEN: Suspected drunk driver was just dodging potholes
James Foster
Shuyee Lee/CJAD 800
A Ste. Adele man who was stopped on suspicion of drunk driving a couple of months ago when he was actually dodging potholes on Route 117, told his story to CJAD 800's Elias Makos on Tuesday morning.
At around 11 p.m. on the evening of April 24, Tom Fermanian locked up the business he owns, the Pine Cinema, and headed down Ste. Adele Blvd. — aka Route 117 — to fill up at a gas station.
The stretch of road he was on was especially treacherous. "It looked like Sarajevo, maybe 15 years ago," Fermanian said. "So I turned my car into a snake, and I slithered through all over the place, trying to avoid potholes, so I'd have a car left."
A Sûreté du Québec officer noticed he was zigagging, and caught up with him as he was setting in at the gas station to fill up.
"I knew what this was about," Fermanian said. "So I walk right away to the officer, I tell him, 'look, you're probably don't like the way I'm zigzagging on the road. And I've not been drinking."
They then asked Fermanian for his papers, and he complied without hesitation, and even offered to take a breathalyzer test before being let go.
Not long after the encounter he posted a Facebook rant, which got the attention of a Journal de Montréal reporter.
"The guy found it hilarious, and they called me up," "They're saying, 'hey, would you mind if we take a picture of where this happened?' I'm expecting [the resulting story] to be buried on page 137...and then, I wake up on Monday morning and my big face is on the newspaper."
Dodging potholes and being accused of being drunk? It really happened to him
Tom Fermanian
Meanwhile, the mayor of Ste. Adele didn't find the story so fun.
Nadine Brière caught wind of Fermanian's story on Facebook and decided to fix the road, under provincial jurisdiction, and sent the bill to the Ministry of Transportation.
Brière told the Journal de Montreal that many parts of the Laurentians are underfunded and expect money from the Ministry for road repairs, but right now there is nothing planned for the next five years, so they will have to be patient.
CJAD 800's Richard Deschamps contributed to this report.
DDO searching for a dastardly dumper clogging up city streets
Compared to other villains, the 'Delinquent Dumper' may not be as scary as the Joker or Thanos, but whoever is behind the messy misdemeanors is still causing trouble on the West Island.
Great white shark spotted off coast of Iles-de-la-Madeleine
Beaconsfield mayor calls CAQ 'incompetent' over new flood zone map
CJAD Newsletter Teaser
Must Listen
Melissa Leong: Why the Summer is making you poor
Money expert Melissa Leong joins Andrew Carter for Toonie Tuesday to discuss where all your money is going this summer without you noticing.
Dr. Mitch: Can ice cream cause something as bad as brain freeze?
Dr. Mitch joins Andrew Cater to discuss why ice cream can cause a brain freeze.
An Emmy winner comes home
Robby Hoffman is back home for Just for Laughs, basking in the glow of her enduring fans.
Typo or error
Group Element CJAD Footer
CJAD contact information
Listener line in studio 514-790-0800
Reception 514-989-2523
Newsroom 514-989-3838
Program & News Director [email protected]
Promotions & Contests Department [email protected]
DDO searching for a dastardly… | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 2,611 | [
128000,
23699,
965,
25,
16687,
4136,
29850,
5696,
574,
1120,
32189,
3252,
3273,
339,
7298,
198,
29184,
39274,
198,
2059,
4168,
2176,
12336,
11547,
41,
1846,
220,
4728,
198,
32,
3441,
13,
63140,
273,
893,
889,
574,
10717,
389,
38141,
315,
29850,
10043,
264,
5743,
315,
4038,
4227,
994,
568,
574,
3604,
32189,
3252,
3273,
339,
7298,
389,
9767,
220,
8546,
11,
3309,
813,
3446,
311,
61976,
1846,
220,
4728,
596,
86756,
40424,
437,
389,
7742,
6693,
627,
1688,
2212,
220,
806,
281,
749,
13,
389,
279,
11714,
315,
5936,
220,
1187,
11,
8529,
435,
4858,
1122,
16447,
709,
279,
2626,
568,
25241,
11,
279,
42609,
49318,
11,
323,
19946,
1523,
3441,
13,
63140,
273,
50541,
13,
2001,
38241,
9767,
220,
8546,
2001,
311,
5266,
709,
520,
264
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
23699,
965,
25,
16687,
4136,
29850,
5696,
574,
1120,
32189,
3252,
3273,
339,
7298,
198,
29184,
39274,
198,
2059,
4168,
2176,
12336,
11547,
41,
1846,
220,
4728,
198,
32,
3441,
13,
63140,
273,
893,
889,
574,
10717,
389,
38141,
315,
29850,
10043,
264,
5743,
315,
4038,
4227,
994,
568,
574,
3604,
32189,
3252,
3273,
339,
7298,
389,
9767,
220,
8546,
11,
3309,
813,
3446,
311,
61976,
1846,
220,
4728,
596,
86756,
40424,
437,
389,
7742,
6693,
627,
1688,
2212,
220,
806,
281,
749,
13,
389,
279,
11714,
315,
5936,
220,
1187,
11,
8529,
435,
4858,
1122,
16447,
709,
279,
2626,
568,
25241,
11,
279,
42609,
49318,
11,
323,
19946,
1523,
3441,
13,
63140,
273,
50541,
13,
2001,
38241,
9767,
220,
8546,
2001,
311,
5266,
709,
520,
264,
-100
] |
What is the human person? Why does the human person exist for happiness? What is a soul? What is a spirit? Is the human soul spiritual? What is morality? What makes for an act to be morally good or bad? In this talk Andrew answers these questions and many more like them.
In this highly informative talk Andrew Wood takes you through some of the key philosophical concepts concerning morality and the human person. In an easy to understand way, Andrew begins by looking at what Aristotle and St Thomas Aquinas say concerning the very nature of the human person. Within this discussion Andrew looks at what a human soul is and shows you the distinction between the three different kinds of soul that we necessarily find among all living material beings: the vegetative soul that enlivens a plant, the sensitive soul which enlivens an animal, and the human soul which vivifies the human person's body.
After looking at the nature of the human soul Andrew then turns his attention to the spirit world. Here Andrew makes the distinction between the three different kinds of spirits: God (the uncreated pure spirit), the angels (created pure spirits) and the human soul. While discussing the nature of what an angel is Andrew raises the question of the distinction between a good and bad angels, which inevitably leads him into looking at the nature of human morality.
In speaking of human morality Andrew gives a concise exposé of the Ten Commandments, and shows how they are hierarchically ordered, according to their natural order of importance. Andrew also demonstrates how the Ten Commandments are natural for the human person and for human society to follow. In conclusion Andrew explains the famous Principle of the Double Effect: a moral principle everyone should explicitly know.
This is a most interesting and informative talk on certain key philosophical concepts concerning morality and the human person. | {
"redpajama_set_name": "RedPajamaC4"
} | 2,453 | [
128000,
3923,
374,
279,
3823,
1732,
30,
8595,
1587,
279,
3823,
1732,
3073,
369,
23871,
30,
3639,
374,
264,
13836,
30,
3639,
374,
264,
9090,
30,
2209,
279,
3823,
13836,
18330,
30,
3639,
374,
45651,
30,
3639,
3727,
369,
459,
1180,
311,
387,
57323,
1695,
477,
3958,
30,
763,
420,
3137,
13929,
11503,
1521,
4860,
323,
1690,
810,
1093,
1124,
627,
644,
420,
7701,
39319,
3137,
13929,
12404,
5097,
499,
1555,
1063,
315,
279,
1401,
41903,
19476,
18815,
45651,
323,
279,
3823,
1732,
13,
763,
459,
4228,
311,
3619,
1648,
11,
13929,
12302,
555,
3411,
520,
1148,
79001,
323,
800,
11355,
23815,
20718,
2019,
18815,
279,
1633,
7138,
315,
279,
3823,
1732,
13,
25218,
420,
10430,
13929,
5992,
520,
1148,
264,
3823,
13836,
374,
323,
5039,
499,
279
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
3923,
374,
279,
3823,
1732,
30,
8595,
1587,
279,
3823,
1732,
3073,
369,
23871,
30,
3639,
374,
264,
13836,
30,
3639,
374,
264,
9090,
30,
2209,
279,
3823,
13836,
18330,
30,
3639,
374,
45651,
30,
3639,
3727,
369,
459,
1180,
311,
387,
57323,
1695,
477,
3958,
30,
763,
420,
3137,
13929,
11503,
1521,
4860,
323,
1690,
810,
1093,
1124,
627,
644,
420,
7701,
39319,
3137,
13929,
12404,
5097,
499,
1555,
1063,
315,
279,
1401,
41903,
19476,
18815,
45651,
323,
279,
3823,
1732,
13,
763,
459,
4228,
311,
3619,
1648,
11,
13929,
12302,
555,
3411,
520,
1148,
79001,
323,
800,
11355,
23815,
20718,
2019,
18815,
279,
1633,
7138,
315,
279,
3823,
1732,
13,
25218,
420,
10430,
13929,
5992,
520,
1148,
264,
3823,
13836,
374,
323,
5039,
499,
279,
-100
] |
So many children today grow up in a world of neglect, violence, and despair. Most of America's youth are at risk. More than half of America's high school seniors have witnessed violent crimes at school and between three and six children are killed by abuse daily. Our educators are struggling today with little support and few tools to effectively equip students for the climate of trauma and fear.
We have experienced a burst in the scientific study of emotional learning and the functioning of the brain and have a more accurate insight into the processes of learning, feeling, and thinking.
Self-Science is a valuable, effective approach to building a vital set of skills and understandings. The value of Self-Science has been proven in practice and in research. In his bestselling book, Emotional Intelligence, Daniel Goldman calls this program "a model for the teaching of emotional intelligence" as one of the two curricula he recommends.
Self-Science is designed to build emotional intelligence and to develop a learning community that fosters respect, responsibility, and resiliency.
Recognize, understand, communicate, and manage feelings.
Recognize and redirect patterns of behavior.
Set goals and move toward them.
Increase respectful communication, thinking, and behaviors.
We have not learned how to make quality of life, joy, purpose, and connection a part of our daily lives. Our society is faced with overwhelming problems of poverty, violence, racism, and selfishness.
Children need to be equipped with tools to grow strong despite the negativity that surrounds them. They need strategies to manage themselves and to reshape their society.
Schools cannot replace family, church, or other cultural systems that historically have shaped the integrity and morality of children. Given our current situation schools need to help reinforce the principles that we all share as a society.
The U.S. is the only country on the entire planet that does not have either a religious context for instruction or a values program as a framework/foundation. It is essential that schools support the learning of parental and community values and the universal principles of our society.
The more conscious one is of experiencing, the greater the potential for self-knowledge. The more self-knowledge one gains, the more likely it is that one can respond positively to one's self and others.
These assumptions are based upon a careful and critical study of respected research in the area of affective education. Eclectic in origin, Self-Science draws principally from 30 years of practice along with research on learning and development; Seligman's studies of optimism; Maslow's hierarchy of needs; Kelly's psychology of personal constructs; child personality and development studies; Neuro-Lingusitic Programming; and scientific methods of inquiry.
Emotions are not in the way of learning, but they are the route to learning. Emotions are not peripheral, but they are central to being human. Perhaps most satisfying for educators, emotional skills are learnable.The following is an great website to learn a lot more.
Equipping educators and faculty withcertification training in tools and processes to fully integrate SEL.
The Arts employ all of our senses.
The young child is a creative child with the ability to appreciate and participate in the creative arts.Through the arts children develop the ability to observe, express, and draw conclusions across disciplines and embrace a lifelong love and appreciation for the arts. The creative arts are a basic human need.
The arts have stood alone for a very long time as subjects isolated into packets of instruction. The arts should be integrated into most areas of the curriculum to produce a well-rounded creative person. It is important to encourage creative expression and nurture the creative talents of children.
Music is a form of storytelling. It is a natural active thing and part of the soul of humanity. Music comes from the heart of life. Singing exercises the lungs, increases breath control, aids speech development and sound and volume control, and increases vocabulary. Teach a second language through song! Music is mathematical. It's stories. Tune in to the rhythm of our heart! Make music a part of every day.
Musical instruments can be bought or made. My first rhythm sticks I made of bamboo. I recommend about eight inch, but you can make them thin or fat, long or short.
Shakers can be from gourds you plant to seashells tied together, or salt boxes with beans or rice or pebbles inside for different sounds. I stay away from plastic anything. Explore and create. You might create shakers filled with different things for children to identify or match sounds together.
Octave bells are used to develop ear training and pitch. I use them to see if they can tell me which is high or low or they can put them in order of pitch and we can also make simple music with them.
Create a sound machine. Each child chooses a sound and their movements then they gather to each other to make a moving machine. It's fun. One of my classes did this as entry into the theater where they were performing. It was great!
Visual arts – to draw is to look, to look is to see, to see is to have vision, to have vision is to understand, to understand is to know, to know is to become, and to become is to live.
Nature will inspire children's drawings. Let them create from natural materials and not pom-poms and artificial junk. There are so many fun natural materials to use and most will cost you nothing.
Not only do children need experiences of visual creation, they need to be exposed to fine art. Take them to the art gallery or an art show or invite artists to your class.
It's important for young children to simply explore the line – straight lines, spirals, and curves. Experiment with dark and light, black and white.
Children need to explore the basic elements of the visual arts: line, shape, color, space, form, texture, and value.
When it comes to color sorting, you can make color gradient boxes using paint strips from the paint store. Large watercolor blocks are easy for children to use painting and always safe.
Have a weaving wall inside or outside the classroom. There are many areas of the visual arts: sculpture, jewelry making, carving (I remember carving a bird from a piece of soap), painting, collage, drawing, coloring, printing, stamping, dying, sewing, weaving, paper making, pottery, photography, and graphic design to name a few. Explore the visual arts with students. Learn by playing!
Enjoy creative experiences, talk about art, create art and go on art adventures. Help children develop an awareness of art in books and in every day life. Create a classroom gallery.
Theatre – Children are natural actors. Allow children to act out in circle time, explore expression and tone with their voices, play theatre games, and pantomime.
Children must be given the opportunity to speak and be heard. Listen and respond to children. Let them tell a story or recite a poem they know. Very young children usually start out doing little finger plays when they are young. Children are still trying to master language so it is good to let them talk and even take turns telling a story, maybe even create a puppet show!
For the very young child reading to them at home is one of the best language learning exercises I know and also stimulates the imagination.
Be imaginative in exploring gestures, posture, movements and body language, vocal tone and variations, facial expressions, and the way we walk.
Movement is required for a young child to develop balance, coordination, strength and even rhythm. Perception and motor development go hand in hand. A dancer's body channels and radiates the music through balanced precise movement! Have children do movement to their songs. Practice yoga exercises 15 minutes a day. Leave time for outside play. Some playgrounds are designed to enhance their perceptual and motor development and encourage exploration. Others are filled with metal bars and swings that become basketball courts and football fields.
Outdoor in nature is where children like and need to be. Ask yourself if what you are doing is something you can do outside and start going outside more. You may find it harder at first because children get so excited about going outside, but with a little time they will calm down and develop more self-control. You will find that things will begin to flow and soon go much better outside and inside the classroom.
Another great fun exercise is dancing. You can introduce culture and language through dance and it is so much fun!
Writing and Language Arts – The very young child focuses on the sounds and rhythm of language to learn speech and then read and write. They can learn to rhyme words very early and enjoy making silly rhymes.
When the child is able to write, keeping a journal is a useful tool. The diary is a type of personal journal. Students can keep a journal of dreams, experiments, thoughts, progress of a plant growing or a journal of their poetry and stories.
Some students like to experiment with ways of writing. Once a child learns to write, they may play and explore writing in different ways such as printing, cursive, writing in a mirror image, writing in code, or invisible writing. They may explore different tools to write with such as pencils, pen and ink, bamboo pens, feather pens, etc. Give them the materials, explain their use, and let them explore and create!
1. Paint pruning cuts – Latex, shellac, petroleum and asphalt compounds are some of the materials used for wound dressing to seal off the cut surfaces to prevent rot and other diseases. New research finds that wound dressings of this sort do not benefit trees and in most cases may be quite harmful.
When part of the stem is damaged, trees use self-healing mechanisms to form a scar at the site of the injury to keep out pathogens. Wound paints prevent the formation of scars and interfere with the natural healing mechanism. They can seal in water, spores, and microorganisms that cause decay. Bleeding cuts should never be dressed in any way.
Make the cut as clean using a sharp instrument. Clean the saw/pruning shears and make a slanting cut close to the collar of the branch. Leave it to the tree to do the rest. Do heavy pruning towards the late winter when trees are at minimum risk of infections.
2. Organic pesticides are safe – Organic compounds derived from plants and animals may be more biodegradable, but it is wrong to think they are all harmless to people or the environment. Some of the most poisonous substances are derived from plants and animals, examples being snake venom, ricin from the castor plant and botulinum produced by bacteria.
Several organic pesticides with varying amounts of toxicity are used in agriculture. Rotenone is a very potent pesticide, insecticide, and piscicide. Organic in origin, it has been found to be six times more toxic to humans and other animals than Sevin. Rotenone is banned in some countries but continues to be used liberally in others.
Nicotine, pyrethrum, and neem are other plant-derived pesticides. Nicotine has high toxicity for mammals, including humans; pyrethrum has immediate action on pests while being less toxic to mammals. Neem has slow action and disrupts the metabolic pathways of insects, but may be safe for other animals.
Bacterial toxins such as Bacillus thuringiensis (Bt) toxin and Alpha Beta Protein are used to trigger defense mechanisms in crops to produce biochemicals that make them more resistant to potential pathogens. The safety of these toxins and the substances plants produce against them is under the scanner. So, organic pesticides should be chosen carefully for their merits rather than their 'organic' label. And, they should be used with the same caution that you reserve for chemical fertilizers.
3. Amend clayey soil with sand – Clay holds water; sand quickly drains. What happens is more compacted soil that defies tilling, let alone better drainage. Fine clay particles fill the spaces between the larger sand particles, giving a thick, mortar-like consistency when mixed with water.
To amend clayey soil, add plenty of compost and leaf mold to resist compaction. It gives the soil an airy structure that facilitates better drainage. Once amended, sand may have some additional benefit.
4. Don't water the garden at mid-day – That doesn't seem to be the case. Many gardeners find it beneficial to spray their plants when they look tired in the hot sun. If any burn spots develop on leaves after you water your garden, check your water for soluble salt concentration. When water droplets evaporate, caustic salts on the leaves may cause burn spots.
5. Plant trees in deep holes to give them stability – The advice to dig a deep hole at least twice the height of the root ball is often followed. Deep holes are not what give stability to trees, but wider ones. The planting hole should be twice the diameter of the root ball, if not more. This provides a large area of loose soil for the roots to spread out. A wider base anchors a top heavy tree better than a narrow one.
6. Fill the planting hole with compost and fertilizers – Planting time is not the best time to provide these. When you fill a planting hole with compost, you give the plant a relatively loose medium rich in nutrients that absorbs moisture well. The plant will restrict its roots to this area. This affects the stability of the plant. In dry spells, fast-draining compost dries up quicker. With few roots beyond this area, the plant suffers. High concentrations of fertilizers can burn the roots, especially new roots. Root burn is a common reason for new plants not thriving.
Keeping the new plant in position, backfill the planting hole with the same soil you dug up. Water well. Allow the plants to spread out its roots in search of nutrients first, and then apply compost and fertilizers around the plant, never too close to the stem. Some gardeners dig a shallow ditch around the plants for adding compost.
7. No more watering if you convert your garden to a xeriscape – It is a myth that drought-tolerant plants don't need to be watered. Plants native to arid lands do need quite a bit of water in the first year. Lavender, Agastache, Salvias, Yarrow, Sage, Blue-eyed grass, Red hot poker plant, Armeria, Black-eyed Susan are all drought-resistant once established but not drought-proof. They need regular watering and an occasional drink in summer. Drought-tolerant plants is hate water logging. Plant them in well-draining soil.
Some plants like cacti and succulents store water and may be able to survive dry periods without much damage. Grasses that dry up in the summer heat may turn green again when rains come. But if you neglect thin-leaved flowering plants, they may not make it through the summer.
8. Plant two of each fruit tree – Some fruit trees need cross-pollination to bear fruit. Self-fertilization can take place if male and female parts are present in the same flower or in different flowers on the same tree. There are exceptions.
Not all trees self-pollinate. They are self-sterile. Some apples, plums, pears and sweet cherry need pollen from other trees for fertilization to take place. Honey bees are the main pollinators of fruit trees. That means you need more than one apple tree or sweet cherry in your own garden or in neighboring gardens for the bees to bring in the pollen.
Just getting two of the same type of tree may not work out here. They have to flower at the same time and be compatible in other ways too. Know which varieties are compatible or go for a self-pollinating variety like Granny Smith and Golden delicious. Persimmons have separate male and female trees and you have no guarantee that you will get a male and a female unless you get grafted trees.
9. Feed a plant to revive it – We often forget that plants can make their own food. Millions of acres of woods and meadows manage without our intervention.
Plants may use up certain minerals in the soil resulting in their gradual depletion. When the minerals are provided with fertilizers, the plants often respond with renewed vitality. But every plant can't be revived with additional feeding. The first step is to find out the reason for the decline such as insect attacks, diseases, environmental stress, adverse weather, damage to roots and root girdling. Both inadequate water and excess water can be detrimental. Rule out probable causes before giving plants a dose of fertilizer. Excess fertilizers can kill a tree under stress.
10. Add sugar or baking soda to get sweet tomatoes – The tomato variety and the amount of sun exposure has bearing on the taste and flavor of tomatoes, but soil pH does not affect sweetness. If you want sweeter tomatoes go for specific varieties known for their sweet taste. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,419 | [
128000,
4516,
1690,
2911,
3432,
3139,
709,
304,
264,
1917,
315,
39332,
11,
9349,
11,
323,
46996,
13,
7648,
315,
5270,
596,
12822,
527,
520,
5326,
13,
4497,
1109,
4376,
315,
5270,
596,
1579,
2978,
38349,
617,
32126,
16806,
17073,
520,
2978,
323,
1990,
2380,
323,
4848,
2911,
527,
7577,
555,
11737,
7446,
13,
5751,
50794,
527,
20558,
3432,
449,
2697,
1862,
323,
2478,
7526,
311,
13750,
26458,
4236,
369,
279,
10182,
315,
30988,
323,
8850,
627,
1687,
617,
10534,
264,
21165,
304,
279,
12624,
4007,
315,
14604,
6975,
323,
279,
31301,
315,
279,
8271,
323,
617,
264,
810,
13687,
20616,
1139,
279,
11618,
315,
6975,
11,
8430,
11,
323,
7422,
627,
12363,
12,
36500,
374,
264,
15525,
11,
7524,
5603,
311,
4857,
264,
16595,
743,
315,
7512
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
4516,
1690,
2911,
3432,
3139,
709,
304,
264,
1917,
315,
39332,
11,
9349,
11,
323,
46996,
13,
7648,
315,
5270,
596,
12822,
527,
520,
5326,
13,
4497,
1109,
4376,
315,
5270,
596,
1579,
2978,
38349,
617,
32126,
16806,
17073,
520,
2978,
323,
1990,
2380,
323,
4848,
2911,
527,
7577,
555,
11737,
7446,
13,
5751,
50794,
527,
20558,
3432,
449,
2697,
1862,
323,
2478,
7526,
311,
13750,
26458,
4236,
369,
279,
10182,
315,
30988,
323,
8850,
627,
1687,
617,
10534,
264,
21165,
304,
279,
12624,
4007,
315,
14604,
6975,
323,
279,
31301,
315,
279,
8271,
323,
617,
264,
810,
13687,
20616,
1139,
279,
11618,
315,
6975,
11,
8430,
11,
323,
7422,
627,
12363,
12,
36500,
374,
264,
15525,
11,
7524,
5603,
311,
4857,
264,
16595,
743,
315,
7512,
-100
] |
Tamsulosin is used by men to treat the symptoms of an enlarged prostate (benign prostatic hyperplasia-BPH). It does not shrink the prostate, but it works by relaxing the muscles in the prostate and the bladder.
Tamsulosin is used by men to treat the symptoms of an enlarged prostate (benign prostatic hyperplasia-BPH). … This helps to relieve symptoms of BPH such as difficulty in beginning the flow of urine, weak stream, and the need to urinate often or urgently (including during the middle of the night). | {
"redpajama_set_name": "RedPajamaC4"
} | 6,567 | [
128000,
51,
4214,
29752,
258,
374,
1511,
555,
3026,
311,
4322,
279,
13803,
315,
459,
74117,
47447,
320,
8123,
625,
463,
2020,
17508,
501,
36259,
7826,
11079,
570,
1102,
1587,
539,
30000,
279,
47447,
11,
719,
433,
4375,
555,
34948,
279,
24569,
304,
279,
47447,
323,
279,
62564,
627,
51,
4214,
29752,
258,
374,
1511,
555,
3026,
311,
4322,
279,
13803,
315,
459,
74117,
47447,
320,
8123,
625,
463,
2020,
17508,
501,
36259,
7826,
11079,
570,
4696,
1115,
8779,
311,
48839,
13803,
315,
426,
11079,
1778,
439,
17250,
304,
7314,
279,
6530,
315,
40335,
11,
7621,
4365,
11,
323,
279,
1205,
311,
4433,
3357,
3629,
477,
77720,
320,
16564,
2391,
279,
6278,
315,
279,
3814,
570,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
51,
4214,
29752,
258,
374,
1511,
555,
3026,
311,
4322,
279,
13803,
315,
459,
74117,
47447,
320,
8123,
625,
463,
2020,
17508,
501,
36259,
7826,
11079,
570,
1102,
1587,
539,
30000,
279,
47447,
11,
719,
433,
4375,
555,
34948,
279,
24569,
304,
279,
47447,
323,
279,
62564,
627,
51,
4214,
29752,
258,
374,
1511,
555,
3026,
311,
4322,
279,
13803,
315,
459,
74117,
47447,
320,
8123,
625,
463,
2020,
17508,
501,
36259,
7826,
11079,
570,
4696,
1115,
8779,
311,
48839,
13803,
315,
426,
11079,
1778,
439,
17250,
304,
7314,
279,
6530,
315,
40335,
11,
7621,
4365,
11,
323,
279,
1205,
311,
4433,
3357,
3629,
477,
77720,
320,
16564,
2391,
279,
6278,
315,
279,
3814,
570,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Fáilte! Welcome to my website.
I am Professor of Information & Organisation in UCD Business School at University College, Dublin. Here you will find information on my research, teaching, and publications.
I am Head of the Management Information Systems subject area and a member of UCD's Centre for Innovation, Technology and Organisation. I am also Director of the PhD and MPhil Programmes in the Michael Smurfit School of Business in UCD.
Previously I was Senior Lecturer in Management and Dean of Commerce at University College Cork. | {
"redpajama_set_name": "RedPajamaC4"
} | 794 | [
128000,
37,
1995,
321,
668,
0,
20776,
311,
856,
3997,
627,
40,
1097,
17054,
315,
8245,
612,
47843,
304,
549,
6620,
8184,
6150,
520,
3907,
9304,
11,
33977,
13,
5810,
499,
690,
1505,
2038,
389,
856,
3495,
11,
12917,
11,
323,
29085,
627,
40,
1097,
11452,
315,
279,
9744,
8245,
15264,
3917,
3158,
323,
264,
4562,
315,
549,
6620,
596,
14821,
369,
38710,
11,
12053,
323,
47843,
13,
358,
1097,
1101,
10783,
315,
279,
30661,
323,
386,
30690,
6826,
9004,
304,
279,
8096,
4487,
324,
6410,
6150,
315,
8184,
304,
549,
6620,
627,
83039,
358,
574,
19903,
42043,
7889,
304,
9744,
323,
25028,
315,
31480,
520,
3907,
9304,
53036,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
37,
1995,
321,
668,
0,
20776,
311,
856,
3997,
627,
40,
1097,
17054,
315,
8245,
612,
47843,
304,
549,
6620,
8184,
6150,
520,
3907,
9304,
11,
33977,
13,
5810,
499,
690,
1505,
2038,
389,
856,
3495,
11,
12917,
11,
323,
29085,
627,
40,
1097,
11452,
315,
279,
9744,
8245,
15264,
3917,
3158,
323,
264,
4562,
315,
549,
6620,
596,
14821,
369,
38710,
11,
12053,
323,
47843,
13,
358,
1097,
1101,
10783,
315,
279,
30661,
323,
386,
30690,
6826,
9004,
304,
279,
8096,
4487,
324,
6410,
6150,
315,
8184,
304,
549,
6620,
627,
83039,
358,
574,
19903,
42043,
7889,
304,
9744,
323,
25028,
315,
31480,
520,
3907,
9304,
53036,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
You are here: Parliament home page > Parliamentary business > Publications and Records > Hansard > Commons Debates > Commons Debates by date > Commons Debates - previous sessions > Bound Volume Hansard - Written Answers
1 Nov 2005 : Column 1027W—continued
Teacher Assaults
Sammy Wilson: To ask the Secretary of State for Northern Ireland how many school teachers were (a) physically and (b) verbally abused by (i) pupils and (ii) parents in the Province in each of the last five years. [22661]
Angela E. Smith: The Department of Education does not collect the requested information. However in relation to pupils, from the 2002–03 school year, statistics on the reasons for suspensions have been gathered annually from each Education and Library Board. The following tables illustrate the number of suspensions for verbal abuse of, and physical attacks on, staff for the 2002–03 and 2003–04 school years:
Suspensions for abuse of staff by pupils in the school year
Reason for suspension
Verbal abuse of staff 1,683 343 2,026
Physical attack on staff 320 45 365
It should be noted that these figures relate to the number of individual suspensions not to the number of pupils suspended. These figures are also available on the
1 Nov 2005 : Column 1028W
Department's website www.deni.gov.uk/facts_figures/education_stats/suspension_stats.htm. Statistics are not yet available for the 2004–05 school year.
Mr. Gregory Campbell: To ask the Secretary of State for Northern Ireland how many instances there have been of attacks on teaching staff in schools in Northern Ireland during the course of their work in each of the last five years. [22855]
Angela E. Smith: The Department of Education does not collect the requested information. However, from the 2002/03 school year, statistics on the reasons for suspensions have been gathered annually from each Education and Library Board. The following tables illustrate the number of suspensions for verbal abuse of, and physical attacks on, staff for the 2002/03 and 2003/04 school years:
Number of suspensions for abuse of staff by pupils in the 2002–03 school year
Verbal abuse of staff
Physical attack on staff
Male 1,683 320
Female 343 45
Total 2,026 365
Number of suspensions for abuse of staff by pupils in the 2003/04 school year
It should be noted that these figures relate to the number of individual suspensions not to the number of pupils suspended.
These figures are available on the Department's website at:
www.deni.gov.uk/facts_figures/education_stats/suspension_stats.htm
Statistics are not yet available for the 2004/05 school year.
Teenage Smokers
Mr. Gregory Campbell: To ask the Secretary of State for Northern Ireland what percentage of (a) female and (b) male secondary level sixth formers at schools in Northern Ireland are estimated to be smokers. [22854]
Angela E. Smith: Information for sixth form pupils is not available. However, the Continuous Household Survey results for 2004–05 showed that 29 per cent. of 16 to 24-year-olds smoke.
Mr. Peter Robinson: To ask the Secretary of State for Northern Ireland whether it is his policy to offer financial support to enable people in Northern Ireland to return to university following redundancy. [22792]
Angela E. Smith: There is no specific financial support targeted at people returning to university after redundancy. A comprehensive package of student support is available for all eligible students entering
higher education including means tested fee remission and bursaries aimed at less well off students, as well as maintenance loans. This support is available for students undertaking their first primary degree.
Winter Fuel Payments
Mrs. Iris Robinson: To ask the Secretary of State for Northern Ireland how many people have received winter fuel payments in (a) Strangford and (b) all other constituencies in the Province; and if he will make a statement. [22818]
Mr. Hanson: The following table shows the number of awards of winter fuel payments for 2004–05 which is the latest year for which the information is available. Strangford constituency has been highlighted in italic.
Parliamentary constituency
Belfast East 17,334
Belfast North 16,212
Belfast South 15,276
Belfast West 12,424
East Antrim 15,344
East Londonderry 14,566
Fermanagh and South Tyrone 14,464
Foyle 13,409
Lagan Valley 17,952
Mid Ulster 12,527
Newry and Armagh 15,623
North Antrim 19,257
North Down 18,288
South Antrim 16,347
South Down 16,758
Strangford 17,910
Upper Bann 16,833
West Tyrone 12,643
Missing postcode 676 | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 1,347 | [
128000,
2675,
527,
1618,
25,
20302,
2162,
2199,
871,
87415,
2626,
871,
62770,
323,
22293,
871,
25844,
569,
871,
26667,
36561,
988,
871,
26667,
36561,
988,
555,
2457,
871,
26667,
36561,
988,
482,
3766,
16079,
871,
38276,
20880,
25844,
569,
482,
34991,
38343,
198,
16,
4723,
220,
1049,
20,
551,
9516,
220,
4278,
22,
54,
2345,
86957,
198,
46165,
50071,
82,
198,
24903,
2465,
17882,
25,
2057,
2610,
279,
12667,
315,
3314,
369,
17355,
14990,
1268,
1690,
2978,
13639,
1051,
320,
64,
8,
22655,
323,
320,
65,
8,
85207,
36665,
555,
320,
72,
8,
45172,
323,
320,
3893,
8,
6699,
304,
279,
38894,
304,
1855,
315,
279,
1566,
4330,
1667,
13,
510,
14057,
5547,
933,
10976,
8458,
469,
13,
9259,
25,
578,
6011,
315,
11930,
1587,
539,
6667
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
2675,
527,
1618,
25,
20302,
2162,
2199,
871,
87415,
2626,
871,
62770,
323,
22293,
871,
25844,
569,
871,
26667,
36561,
988,
871,
26667,
36561,
988,
555,
2457,
871,
26667,
36561,
988,
482,
3766,
16079,
871,
38276,
20880,
25844,
569,
482,
34991,
38343,
198,
16,
4723,
220,
1049,
20,
551,
9516,
220,
4278,
22,
54,
2345,
86957,
198,
46165,
50071,
82,
198,
24903,
2465,
17882,
25,
2057,
2610,
279,
12667,
315,
3314,
369,
17355,
14990,
1268,
1690,
2978,
13639,
1051,
320,
64,
8,
22655,
323,
320,
65,
8,
85207,
36665,
555,
320,
72,
8,
45172,
323,
320,
3893,
8,
6699,
304,
279,
38894,
304,
1855,
315,
279,
1566,
4330,
1667,
13,
510,
14057,
5547,
933,
10976,
8458,
469,
13,
9259,
25,
578,
6011,
315,
11930,
1587,
539,
6667,
-100
] |
She's pumping for a ticket to a forthcoming game!
British Ambassador to Ireland, Mr Julian King, talking about Her Majesty's historic first visit to Ireland.
Manchester City defender Jerome Boateng, 22, could be on his way out of Eastlands in an £8m move to Bayern Munich.
And new pj's! With 4 players imprinted.
And we all know the official colour of Chelsea's kit?!?! | {
"redpajama_set_name": "RedPajamaC4"
} | 5,378 | [
128000,
8100,
596,
53226,
369,
264,
11989,
311,
264,
45764,
1847,
4999,
52961,
45672,
311,
14990,
11,
4491,
38897,
6342,
11,
7556,
922,
6385,
67344,
596,
18526,
1176,
4034,
311,
14990,
627,
75343,
4409,
29315,
70874,
45332,
833,
11,
220,
1313,
11,
1436,
387,
389,
813,
1648,
704,
315,
6460,
8329,
304,
459,
7083,
23,
76,
3351,
311,
56691,
47304,
627,
3112,
502,
73713,
596,
0,
3161,
220,
19,
4311,
737,
53313,
627,
3112,
584,
682,
1440,
279,
4033,
12745,
315,
27616,
596,
16530,
27074,
27074,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
8100,
596,
53226,
369,
264,
11989,
311,
264,
45764,
1847,
4999,
52961,
45672,
311,
14990,
11,
4491,
38897,
6342,
11,
7556,
922,
6385,
67344,
596,
18526,
1176,
4034,
311,
14990,
627,
75343,
4409,
29315,
70874,
45332,
833,
11,
220,
1313,
11,
1436,
387,
389,
813,
1648,
704,
315,
6460,
8329,
304,
459,
7083,
23,
76,
3351,
311,
56691,
47304,
627,
3112,
502,
73713,
596,
0,
3161,
220,
19,
4311,
737,
53313,
627,
3112,
584,
682,
1440,
279,
4033,
12745,
315,
27616,
596,
16530,
27074,
27074,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
\section*{\label{sec:intro}Introduction}
"Logic-In-Memory" (LIM) architectures have recently emerged as an alternative to Von Neumann architectures, where the constant shuttle of data between logic and memory units leads to a critical rise in energy consumption and delay when downscaling. This has led to the search for novel technologies that combine memory and logic functionalities. Recently, magnetic skyrmions have been proposed as the building block of such logic-in-memory technologies. Magnetic skyrmions are local chiral whirling of the magnetization. Their small lateral dimensions, down to the nanometer size and topological stability grant them particle-like properties, which, combined with the possibility to be manipulated via electrical currents, can be exploited to code data and achieve computation at the nanoscale. These textures appear promising for logic-in-memory applications since they intrinsically merge high density non-volatile storage and logic capabilities. However, while a number of memory and logic concepts have been proposed based on skyrmions~\cite{song2021logic,gnoli2021skyrmion,zhang2020stochastic,chauwin2019skyrmion,zhang2019skyrmion,he2017current,xing2016skyrmion,zhang2015magnetic,luo2018reconfigurable,yan2021logic16,mankalale2019skylogic,Fattouhi2021PhysRevApplied}, several major issues have hindered their technological advancement. In the first concepts of the skyrmion racetrack~\cite{fert_skyrmions_2013}, data was encoded through the distance between neighboring skyrmions and the memory operation relies on the synchronous shift of skyrmion trains, where the skyrmion interdistance remains constant. However, the latter can be easily perturbed by thermal activation or small variation in the skyrmion velocities, induced for instance by local changes in the magnetic properties in the material or process variations.
Different pathways have been proposed to solve this issue such as double lanes~\cite{muller_magnetic_2017} or local gate control~\cite{kang2016complementary}. However, these solutions appear difficult to implement. For instance, local gate control requires numerous gate contacts leading to increased periphery area, limited density and increasing complexity. Regarding skyrmion based logic, the fundamental building blocks need to fulfill a set of criteria, including cascading, fan-out, logic level restoration, immunity to noise, mitigation of potential loss of information, and input-to-output isolation. However, concepts proposed so far required complex operations and faced serious limitations. These include skyrmion-charge inter-conversion which limits the advantage of a full skyrmionic signal~\cite{mankalale2019skylogic,xing2016skyrmion,he2017current,yan2021logic16}, large skyrmion circuits requiring complex synchronization of data~\cite{chauwin2019skyrmion}, multiple gate voltages with complex implementation~\cite{zhang2020stochastic,zhang2019skyrmion}, etc. In addition, several proposals do not fulfill the aforementioned basic requirements of logic, namely cascading, input and clock synchronization, etc \dots Thus, there is currently no concept for a full skyrmionic computer, incorporating logic, memory and interconnects using exclusively magnetic signals without the need for intermediate conversion to charge signals.
\begin{figure*}[!htb]
\includegraphics[width=0.9\linewidth]{Fig1_nucleatev8.pdf
\caption{\label{fig:nucleate}(a) Schematic of a skyrmion generator with regions of different anisotropy values. Current can be sent in-between $C_1-C_2$ or $C_2-C_3$. (b) Energy as the skyrmion moves between two bit cells $R_2$ and $R_3$. $E_{\rm 0}$ is the energy of the skyrmions inside the bit cell. The anisotropy fields are indicated in the different regions. (c) Protocol for data encoding: a skyrmion is first nucleated in the low anisotropy region (row 1) by sending current between $C_1-C_2$ (J=15 MA/m$^2$ for 0.3 ns) and then pushed ("fired") to the 80nm cells (row 2) which work as memory bits ($J=35\rm ~MA/cm^{2}$ for $0.55\rm~ns$). A shift operation is carried out by sending current between $C_2-C_3$ (row 3) ($J=15\rm~MA/cm^{2}$ for $0.9\rm~ns$). We show only the top layer magnetization of the SAF as the bottom layer is magnetized symmetrically opposite to the top layer due to strong RKKY coupling. (d) Full 8-bit skyrmion data encoding of an 8-bit binary number ``10001011" using operations given in (c). Note that the data is encoded starting first from the least significant digit.}
\end{figure*}
Besides the aforementioned limitations, moving skyrmions are subject to the skyrmion Hall effect (skHE), namely a motion transverse to the driving force. To address this problem, topological spin textures with vanishing topological charges and thus skHE have been proposed as alternatives of skyrmions~\cite{zhang2016antiferromagnetic,jin2016dynamics,2018_SciRep_KolesnikovSamardakOgnev,sisodia_droplet_PRB_2021,dohi2019formation,legrand2020room,juge_skyrmions_2021,saf_zhang2016magnetic}. Of particular interest are skyrmions in synthetic antiferromagnets (SAF), which have been recently demonstrated to be stable at room temperature~\cite{dohi2019formation,legrand2020room,juge_skyrmions_2021}. These skyrmions are resilient against external stray magnetic fields and possess velocities which are much higher than their ferromagnetic counterparts, making them good candidates for elementary building blocks in storage and logic. In addition to using magnetic configurations with zero topological charge, skHE can also be suppressed with different confinement techniques~\cite{indent3d_pathak,albisetti2016NatNano_nanopatterning,albisetti2017AIPnanopatterning,guang2020creating,juge2021helium,domainwallconfinement}. In particular, we have shown that skyrmion channels can be defined by a local modification of the magnetic properties using light ion irradiation. This can be exploited to guide the skyrmion dynamics and suppress the skyrmion Hall effect~\cite{juge2021helium}. This technique can also be leveraged for a reliable control of the skyrmion position in racetracks as well as guide their motion in complex geometries to achieve logic operations.
In this work, using micromagnetic simulations, we propose a Logic-In-Memory (LIM) device based on SAF skyrmions which leverages skyrmion confinement using local variation of the anisotropy. It combines two main innovations: Firstly, a novel concept of racetrack shift register where the skyrmion position is defined by low anisotropy dots and moved reliably using current induced spin-orbit torques. This provides an elegant solution to the longstanding issue of reliability of data retention and shift operation in racetracks. We develop elementary protocols for basic ``nucleate" and ``shift" operations on a train of skyrmions. Secondly, a compact Full Adder logic gate extendable to n-bit FA by cascading is designed. The designed FA can be re-programmed to perform different logic operations (e.g. NOT, BUFFER, AND, OR, XOR, NXOR, NAND). Our proposal allows a simple and intuitive synchronization scheme which in turn enables us to seamlessly cascade logic design to implement large-scale networks without any additional electronic circuitry. The designed logic architecture can also tolerate deviations in the amplitude or width of the current pulses which may arise from the electrical part of the design.
\section*{\label{sec:nucleation}Skyrmion Nucleation and Confinement}
As shown in our previous work~\cite{juge2021helium}, it is possible to artificially create an energy barrier for a skyrmion using focused He$^+$ ion-irradiation which locally modifies the material properties (anisotropy and Dzyaloshinskii-Moriya interaction (DMI)) of the ferromagnet. Using this feature, we can engineer regions of different anisotropy values specifically tuned for two different tasks, namely nucleation and confinement of skyrmions.
For the micromagnetic simulations, a SAF structure is assumed composed of two Co layers with a thickness of 0.9nm antiferromagnetically coupled by RKKY interaction and separated by a thin spacer [see Appendix.~\ref{sec:methods} for details regarding the micromagnetic model and parameters]. The magnetic parameters for the irradiated and non-irradiated areas are close to the ones of the Pt/Co/MgO stacks measured experimentally in Ref.~\cite{juge2021helium}. The He$^+$ ion irradiation leads to a decrease of the perpendicular magnetic anisotropy as well as the DMI.
In Fig.~\ref{fig:nucleate}(a), we show the schematic of a skyrmion generator device coupled with a memory (bit) cell which can physically confine and hold a skyrmion inside of it. There are three different regions of anisotropy. The larger $\rm150 nm$ square-shaped cell ($R_1$) with a very small effective anisotropy of $B_{\rm K,eff}=5\rm mT$ is used to nucleate the skyrmion. The anisotropy of this region is intentionally kept smaller to reduce the current density required to nucleate the skyrmion. The second region is composed of the $\rm80 nm$ bit cells ($R_2$ and $R_3$) with $B_{\rm K,eff}=100\rm mT$, which are surrounded by high anisotropy regions of $B_{\rm K,eff}=165\rm mT$. These act as a barrier for the skyrmion, effectively trapping the skyrmion inside the bit cells. In Fig.~\ref{fig:nucleate}(b), we show the energy of the skyrmion as a function of its position $x$ as it passes from region $R_2$ to $R_3$. The energy is highest in the middle of regions $R_2$ and $R_3$. The energy barrier is $\sim33k_BT$ providing reasonable stability to the device against thermal noise. More information on the calculation and optimization of the energy barrier is given in Appendix.~\ref{sec:barrier}.
To nucleate and shift the skyrmions, three separate contacts $C_1$, $C_2$ and $C_3$ are used (Fig.~\ref{fig:nucleate}(a)).
To nucleate a skyrmion in $R_1$ (first panel of Fig.~\ref{fig:nucleate}(c)), a short ($0.3\rm~ns$) current pulse ($J=15\rm ~MA/cm^{2}$) is first injected in between contacts $C_1-C_2$. A second current pulse with a higher current density ($J=35\rm ~MA/cm^{2}$ for $0.55\rm~ns$) allows the skyrmion to overcome the barrier and move from $R_1$ towards $R_2$. Simultaneously, due to the high current density, another skyrmion nucleates in the region $R_1$. This whole operation can thus be dubbed as ``fire+nucleate" as one skyrmion is nucleated and another skyrmion is simultaneously fired (panel 2 of Fig.~\ref{fig:nucleate}(c)). Once nucleated, the shift operation is performed by injecting a current between contacts $C_2$ and $C_3$ such that the skyrmions move between $R_2-R_3$ without influencing the nucleation region $R_1$ (third row panel in Fig.~\ref{fig:nucleate}(c)). Overall, to encode a full data stream, the following protocol is adopted: 1.) Nucleate in region $R_1$, 2.) If Bit 1 is required, use ``fire+nucleate" followed by ``shift" 3.) If Bit 0 is required, use only ``shift". We show in Fig.~\ref{fig:nucleate}(d) and in video SV1 the encoding of an 8-bit binary number ``10001011" in a racetrack composed of 9 cells using this protocol. After nucleation, the skyrmion train shifts synchronously along the cell track when injecting the current pulses. Thus, our proposed racetrack design based on confinement cells and current induced tunneling provides large bit stability and natural synchronization of the bit train, solving an important issue of initial skyrmion racetrack design.
\begin{figure*}[!htb]
\includegraphics[width=0.7\linewidth]{Fig2_onebit_figure_v4.pdf
\caption{\label{fig:1bit}Design and operation of a 1-bit Full-Adder (FA) based on irradiated SAF. (a) shows the schematic of the FA and the current pulses which are designed to move the skyrmions from their respective bits on the left to the middle region where the operation takes place and then to the output bits on the right. The current pulses $J_1$ and $J_2$ have an amplitude and duration of $J_1=15\rm~MA/cm^{2}$ and $t_1=0.8\rm~ns$ and $J_2=5\rm~MA/cm^{2}$ and $t_2=0.9\rm~ns$. (b)-(f) show the micromagnetic simulation of the 1-bit FA gate for various test cases. Snapshot of the magnetization at different times are overlayed to show the complete trajectories of the skyrmions (black solid curves). (g) Serial FA operation on a stream of $C_{in}$, $A$ and $B$ inputs. }
\end{figure*}
\section*{\label{sec:1BitFA}Full Adder Design}
A Compact full Adder (FA) logic gate can also be designed using anisotropy energy barriers in irradiated SAF stacks. A Full Adder is considered as the basic unit in Arithmetic Logic Unit (ALUs) performing bitwise addition of two binary numbers. It has three inputs, $A$, $B$ and $carry-in~(C_{\rm in})$ and produces two outputs, $Sum$ and $carry-out~(C_{\rm out})$. The logic gate is divided into three parts (see Figure.~\ref{fig:1bit}(a)). The left part of the device is made of three bit cells, which are the inputs $A$, $B$ and $C_{\rm in}$. Similarly, at the right-hand side of the logic gate, three other bit cells hold the two outputs $Sum$ and $C_{\rm out}$ of the FA. The middle region of the design represents the part of the device which performs the logic operation. All three regions and the individual bit cells are separated from each other by anisotropy energy barriers.
We show the operation of the designed Full Adder gate in Figs.~\ref{fig:1bit}(b)-(f) and in video SV2: The skyrmions which are present inside the bit cells inputs $A$, $B$ and $C_{\rm in}$ on the left region are pushed inside the middle region after passing over the energy barrier by sending a current pulse uniformly through the device ($J_1=15\rm~MA/cm^{2}$). When skyrmions are inside the middle region, different possibilities arise depending on the total number of skyrmions inside the middle region. For only one skyrmion [Figs.~\ref{fig:1bit}(b)-(c)], the most stable state for the skyrmion is to stay at the center of the middle region. However, when there are two skyrmions [Figs.~\ref{fig:1bit}(d)-(e)], they repel each other and would stay near the top and bottom edge of the middle region to minimize their mutual interaction. When the total number of skyrmions in the middle region is three [Figs.~\ref{fig:1bit}(f)], the skyrmions will maximize the individual distances between them and will acquire a position at the top, middle and bottom parts.
To achieve the relaxation of the interacting skyrmions in the middle part, two pulses with smaller amplitude $J_2=5\rm~MA.cm^{-2}$ are then injected. The skyrmions are then pushed into the rightmost region by sending a current pulse with a larger amplitude $J_1$. At the output end, the middle cell will only have a skyrmion if the total number of skyrmions on the input side is either one or three. This represents the $Sum$ output of the Full Adder. Similarly, the top and bottom outputs will only have a skyrmion if the total number of input skyrmions is either two or three. This is the same as the $C_{\rm out}$ (carry-out) output of the Full Adder. We thus achieve an entire full adder operation with a single logic gate.
We have specifically designed our FA logic gate in Fig.~\ref{fig:1bit}(a) keeping in mind an easy integration with racetrack storage such as the one in Fig.~\ref{fig:nucleate}(a). Using this architecture, the FA logic gate can be easily extended to perform logic operations with a continuous stream of data to serially compute $Sum$ and $C_{\rm out}$ outputs for each input set of data bits. Such an operation is shown in Fig.~\ref{fig:1bit}(g), where we show serial 1-bit FA calculation on streams of input $A$, $B$ and $C_{\rm in}$ [see also video SV3]. The current pulses, in general, follow the same protocol and can be easily extended to perform $n$ operations, where $n$ is the total number of bits in the bit-stream.\footnote{The only modification needed in the current pulses is the merging of $J_1$ pulse of outgoing operation with the $J_1$ pulse of incoming operation as both of these operations can be carried out simultaneously without affecting the logic operation.}
\begin{figure*}
\includegraphics[width=\linewidth]{Fig3_full_3bit_v10.pdf
\caption{\label{fig:3bit}(a) Design of a 3-bit Full-Adder (FA) by cascading three 1-bit FAs. Additional components have been added to synchronize inputs application and the entire operation (b) shows the micromagnetic simulation for the case of (101+111=1100). The current pulses used to perform the logic operation are exactly the same as the 1-bit FA operation repeated 3-times. (c) and (d) show the design and operation of an FA where the carry-bit can be sent back using current of negative polarity with density $J=-10\rm~MA/cm^{2}$ for $t=3.2\rm~ns$ followed by an off-pulse ($J=0\rm~MA/cm^{2}$) of $1\rm ~ns$. (e) Operation of a 3-bits FA using the modified FA shown in (c). The operation corresponds to the case (011+111=1010). (f)-(h) shows the comparison of both approaches for 3-bits addition in terms of device area, energy consumption and operation time, respectively.
}
\end{figure*}
\section*{\label{sec:3bitFA}Full Adder Multi-bit operation}
One limitation of the FA gate is that it only operates on 1-bit inputs. For instance, the actual operation on the bitstreams shown in Fig.~\ref{fig:1bit}(g) is a 1-bit FA operation done serially on each arriving set of input bits, since the carry-bit ($C_{\rm out}$) is not taken forward in each successive computation. We show here that $N$-bit FA gates can be easily designed by properly cascading 1-bit FA gates. As an example, we present in Fig.~\ref{fig:3bit}(a) the design of a 3-bit FA gate composed of three cascaded FA gates where the carry bit from each computation is used in the next computation. The bottom $C_{\rm out}$ from the FA1 is connected to the top bit cell of FA2, such that the output $C_{\rm out}$ from FA1 operation is used as one of the inputs of FA2 operation. To ensure that the two other inputs of FA2 reach at the same time as the output $C_{\rm out}$ of FA1, we add some delay gates Sync-In (green boxes) before FA2. These synchronization gates can be cascaded to vary the delay time and provide on-demand synchronization between various segments of logic operations. Similar gates are also added to synchronize the outputs (Sync-Out, black).
In Fig.~\ref{fig:3bit}(b) and video SV4, we show the operation of a 3-bit FA using cascaded 1-bit FAs. The calculation performed is ($a_3~a_2~a_1$) + ($b_3~b_2~b_1$) = ($c_4~c_3~c_2~c_1$), where ($a_3~a_2~a_1$)=(101) and ($b_3~b_2~b_1$)=(111). The expected output is ($c_4~c_3~c_2~c_1$)=(1100) which is correctly obtained by bit cells $c_4$, $c_3$, $c_2$ and $c_1$ shown by dotted yellow boxes.
The design of Fig.~\ref{fig:3bit}(a) is very promising for fast n-bit FA operation and for further modifications using cascading and synchronization. However, a more compact and low power design can be implemented by directly computing the n-bits FA operation using streams of skyrmions in two racetracks and a single FA gate. This would be similar to the operation of FA shown in Fig.~\ref{fig:1bit}(g), however, with bit-streams replaced with $N$-bit numbers. For this purpose, we modify our FA design to include another region of different anisotropy value as shown in Fig.~\ref{fig:3bit}(c). This new region (light blue) which covers the area joining the input bits to middle region and the area to the left of top $C_{\rm out}$ bit has an anisotropy in-between the anisotropy of the regular bit cells and the barrier region. This enables us to send a negative polarity current pulse which is enough to move only the $C_{\rm out}$ bit while keeping the other skyrmions at their respective places. This pulse is shown alongside in Fig.~\ref{fig:3bit}(c) [highlighted part]. In Fig.~\ref{fig:3bit}(d), we show how the $C_{\rm out}$ bit is moved back to the input end by this current pulse of negative polarity. During the entire operation, none of the other skyrmions are affected. Using this, we can now compute the addition operation of two $N$-bit numbers by successively sending them through the top and bottom inputs of the FA (middle input is left empty). The design and operation for a 3-bit FA using this strategy is shown in Fig.~\ref{fig:3bit}(e) and video SV5. It may be noted that we need to add an empty bit between each successive bit as no operation can take place during the movement of $C_{\rm out}$ bit using negative polarity current. The snapshots in Fig.~\ref{fig:3bit}(e) correspond to the initial and final stage of the addition operation ($a_3~a_2~a_1$) + ($b_3~b_2~b_1$) = ($c_4~c_3~c_2~c_1$), where, ($a_3~a_2~a_1$)=(011), ($b_3~b_2~b_1$)=(111) and the expected output is ($c_4~c_3~c_2~c_1$)=(1010) which is correctly computed with our implementation. The inputs and outputs are shown in dotted yellow boxes.
\begin{figure*}[!htb]
\includegraphics[width=0.7\linewidth]{Fig4_nand_v2.pdf
\caption{\label{fig:nand}Different logic gate designs derived from the FA. (a) shows a NOT/COPY gate design. Some input bits have been fixed to either "0" or "1". Similarly, (b) and (c) show XOR/AND and NXOR/OR gates derived from FA. (d) shows a universal NAND gate designed by cascading AND and NOT gates, both of which are modified versions of FA. (e) shows the operation of NAND for both inputs as 1.
}
\end{figure*}
The performance of the two methods for $N$-bit FA computation described above can be compared on the basis of three important characteristic metrics: (i) Device Area, (ii) Energy consumption and (iii) Operation time. In Fig.~\ref{fig:3bit}(f), we show the variation of the device area with the number of bits ($N$). For the cascaded FA shown in Fig.~\ref{fig:3bit}(a), both dimensions in the $x-y$ plane increase linearly with $N$ leading to an `$\mathcal{O}\rm~(N^2)$ variation of device area. However, since only one FA gate is needed for the alternative approach (without cascading) shown in Figs.~\ref{fig:3bit}(c)-(e), the device area remains the same as `$N$' increases. Note that in Fig.~\ref{fig:3bit}(e), the increase in the length along x-axis is not included in the calculation as the extended regions are considered as a part of the racetrack storage rather than logic. In Fig.~\ref{fig:3bit}(g), we show the total energy consumption of the FA logic gate as a function of number of bits. For a 1-bit operation, the energy of the operation is $9\rm~fJ$. In the case of cascaded FA operation, the energy dramatically increases with the number of bits as $\mathcal{O}\rm~(N^3)$ due to linear increase in operation time and quadratic increase in the device area. However, when using the FA design shown in Fig.~\ref{fig:3bit}(c)-(e), the total energy only increases linearly with the number of bits. For a 32-bit operation, the total energy consumption is $\sim0.8~\rm pJ$ which is more than two orders lower than the cascaded FA operation. However, this design suffers from a larger operation time compared to cascaded FA gate since each operation is delayed by $4.2\rm~ns$ to move the carry-out bit back to the input position [Fig.~\ref{fig:3bit}(h)]. Due to the Joule dissipation in the metallic conductors, the proposed device consumes 1-2 orders of magnitude more energy for individual logic operations compared to state-of-art CMOS full adder~\cite{energycomp}. However, owing to its intrinsic logic-in-memory approach, a large gain in energy and delay is expected at the device level, since it minimizes the energy dissipated in interconnects and the stand-by power. Note that the speed of both designs can be further increased by using skyrmions with higher velocity ($>1000\rm m/s$ is expected for SAF~\cite{tomasello2017performance} which is 6 times the maximum velocity of skyrmions in this work).
\section*{\label{sec:derivative}Re-programming FA logic}
Full adder logic gates can be easily modified in order to build a number of basic logic functions, which in turn can be combined to perform complex logic operations.
The output of the full adder gate is given as: \(Sum=C_{\rm in}\oplus (A \oplus B)\) ; \(C_{\rm out}= AB+BC_{\rm in}+AC_{\rm in}\). By fixing one or more of the inputs, different logic gates can be achieved. Note that the inputs of a FA logic gate are all interchangeable, so it does not matter which of the inputs are fixed. Figures~\ref{fig:nand}(a)-(c) show the modified FA gates which can perform COPY, NOT, AND, XOR, OR and XNOR operations.
The universal NAND gate can also be designed by cascading two modified FA gates [Fig.~\ref{fig:nand}(d)]. The first gate is modified by setting one of the inputs to ``0" such that the $C_{\rm out}$ represents the output of an AND gate. The second FA gate is modified to perform an inversion operation by setting two of the inputs to ``0'' and ``1''. The operation of this gate for a test case of $A=1$ and $B=1$ is shown in Fig.~\ref{fig:nand}(e). The output $\overline{A.B}=0$ corresponding to the NAND gate is highlighted. It may be noted that we also obtain AND and XOR outputs along with the NAND output.
\section*{\label{sec:FAtolerance}Electrical Tolerances and failure mechanisms}
\begin{figure}[!htb]
\includegraphics[width=\linewidth]{Fig5_tolerance_figv4.pdf
\caption{\label{fig:tolerance}(a) Current pulses used for FA operation in Fig.~\ref{fig:1bit}. (b) Acceptable change (\%) in different parameter values in the current pulse. (c) Test case with inputs (0,1,1) for FA operation with random anisotropy grains.}
\end{figure}
For practical application of our design, it is important to probe its tolerance against variations in the current amplitude or pulse width. In Fig.~\ref{fig:tolerance}(a), we show the set of pulses used for the 1-bit Full Adder operation. There are two different current density values used in the circuit : $J_1=15\rm~MA/ cm^{2}$ and $J_2=5\rm~MA /cm^{2}$ with pulse widths of $t_1=0.8\rm~ns$ and $t_2=0.9\rm~ns$, respectively. There is also an off-pulse of width $t_0=0.5\rm~ns$. We individually vary each of these parameters by fixing other parameters at their reference values. We also try to vary $J_1$, $J_2$ or $t_0$, $t_1$ and $t_2$, simultaneously. The results are shown in Fig.~\ref{fig:tolerance}(b) depicting the acceptable level of variation for each case for which the logic operations are executed without any errors. Note that these results are also valid for the NAND as well as other derived logic gates. These tolerance values provide valuable input for further modeling with large-scale electrical circuit designing tools.
We also performed simulations to check the robustness of device against variations in anisotropy. We varied the effective anisotropy field of the barrier region and found that the Full Adder works correctly for the range of values $\rm 155mT-167mT$. Further, we also perform simulations by adding grains of size $\rm 15nm$ with random $0.5\%$ variation of anisotropy constant (equivalent to $\sim5\%-8\%$ change in effective anisotropy field), similar to previous works~\cite{juge2018magnetic,gross_skyrmion_2018} and show that the Full Adder works correctly. The motion of skyrmions for a test case with inputs (0,1,1) is shown in Fig.~\ref{fig:tolerance}(c). However, we note that a stronger anisotropy variation may lead to incorrect operations. In our device, this happens as the skyrmions are stabilized for the parameter values which are close to in-plane to out-of-plane transition regime. Therefore, a small change in the anisotropy constant rapidly changes the skyrmion energy and hence its trajectory. A possible strategy to mitigate this is to use higher anisotropy thin films as the pristine sample and then irradiating them to obtain the tracks/barriers with the same anisotropy difference as used in this work.
An important part of the logic gate design involves device testing against a possible failure during operation. To investigate this point, we include thermal noise corresponding to $\rm T=350~K$ in our simulations \footnote{As we are already doing simulations with experimental parameters extracted at T=300K, we only include thermal noise corresponding to T=50K to avoid overestimating the effect of temperature}. We simulate 20 instances for each of the possible 8 test cases for the Full Adder (total 160 attempts). Despite high thermal noise, the Full Adder worked correctly for $\sim85\%$ of the total attempts. For the cases in which it failed, three different failure mechanisms were found. The first one is caused by the annihilation of input skyrmions during the operation. We predict that a stronger RKKY coupling could counter the thermal noise and improve the overall stability of the SAF skyrmions. The second failure mechanism is due to the presence of skyrmions at the wrong output after the operation has ended. This happens when the skyrmion diffusion due to thermal noise significantly perturbs the intended trajectory of the skyrmions. Higher Gilbert damping is expected to minimize this effect. However, the trade-off will be an increased energy consumption as higher current densities will be required to move the skyrmions.
The third possibility is a skyrmion getting stuck in between two bit cells. This occurs when the skyrmion finds a local minima in between two memory bits. Our barrier has already been optimized to avoid this situation [see Appendix.~\ref{sec:barrier}], however, further optimization is needed to comply with high-temperature conditions. This will involve increasing the difference of anisotropy between the low and high anisotropy regions which will increase the barrier height.
\section*{\label{sec:future}Conclusion}
To conclude, we proposed a logic-in-memory device based on skyrmion confinement and channeling by anisotropy energy barriers in synthetic antiferromagnets. We first designed a racetrack shift register memory based on skyrmions confined by anisotropy energy barriers as memory bits, allowing reliable data storage with large stability and robust synchronous shift operations on skyrmion train. This design naturally solves the stability and synchronization issues of the initial racetrack concept without introducing additional gates or complex geometries. We then combine our racetrack storage with a newly designed 1-bit Full Adder (FA) gate extendable to $N$-bits FA by cascading. The designed FA is reprogrammable and can also be used to perform AND/OR/NOT/NAND/XOR/NXOR operations. The device is expected to perform well even with some fluctuations in the amplitude/width of the injected current pulses and in presence of thermal noise. The simplicity and compactness of the design combined with the minimal use of electrical circuitry brings the proposed device to the same level as the current technological capabilities of fabrication/manufacturing processes, thus providing an important advance for the development of skyrmion-based logic-in-memory technology.
\begin{acknowledgments}
The authors acknowledge financial support from the French national research agency (ANR) (Grant Nos. ANR-15-CE24-0015-01 and ANR-17-CE24-0045) and the American defense advanced research project agency (DARPA) TEE program (Grant No. MIPR HR0011831554). This work has been partially supported by MIAI@Grenoble Alpes, (ANR-19-P3IA-0003).
\end{acknowledgments}
| {
"redpajama_set_name": "RedPajamaArXiv"
} | 9,610 | [
128000,
59,
2879,
9,
36802,
1530,
90,
5132,
14674,
299,
92,
38255,
534,
720,
1,
27849,
32600,
5364,
4836,
1,
320,
43,
1829,
8,
78335,
617,
220,
6051,
22763,
439,
459,
220,
10778,
311,
43179,
4275,
64607,
78335,
11,
1405,
279,
6926,
45641,
315,
828,
1990,
12496,
323,
5044,
8316,
11767,
311,
264,
9200,
10205,
304,
4907,
15652,
323,
7781,
994,
1523,
94152,
13,
1115,
706,
6197,
311,
279,
2778,
369,
11775,
14645,
430,
16343,
5044,
323,
12496,
93180,
13,
42096,
11,
24924,
13180,
8892,
919,
617,
1027,
11223,
220,
439,
279,
4857,
2565,
315,
1778,
12496,
3502,
65196,
14645,
13,
63755,
13180,
8892,
919,
527,
2254,
523,
37478,
421,
51868,
315,
279,
33297,
2065,
13,
11205,
2678,
45569,
15696,
11,
1523,
311,
279,
20622,
21037,
1404,
323
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
59,
2879,
9,
36802,
1530,
90,
5132,
14674,
299,
92,
38255,
534,
720,
1,
27849,
32600,
5364,
4836,
1,
320,
43,
1829,
8,
78335,
617,
220,
6051,
22763,
439,
459,
220,
10778,
311,
43179,
4275,
64607,
78335,
11,
1405,
279,
6926,
45641,
315,
828,
1990,
12496,
323,
5044,
8316,
11767,
311,
264,
9200,
10205,
304,
4907,
15652,
323,
7781,
994,
1523,
94152,
13,
1115,
706,
6197,
311,
279,
2778,
369,
11775,
14645,
430,
16343,
5044,
323,
12496,
93180,
13,
42096,
11,
24924,
13180,
8892,
919,
617,
1027,
11223,
220,
439,
279,
4857,
2565,
315,
1778,
12496,
3502,
65196,
14645,
13,
63755,
13180,
8892,
919,
527,
2254,
523,
37478,
421,
51868,
315,
279,
33297,
2065,
13,
11205,
2678,
45569,
15696,
11,
1523,
311,
279,
20622,
21037,
1404,
323,
-100
] |
Who sold the Voynich MS to Rudolf
Provenance & history
ReneZ > 19-07-2018, 03:52 PM
The quick answer is: I don't know, but Koen correctly pointed out:
Quote: I have a theory about who sold the MS to Rudolf.
Hey, as the Dutch saying goes, "who says A, must say B"
I mentioned a name in my 2012 presentation in Villa Mondragone. This is the Augsburg physician, paracelsan and manuscript collector Karl Widemann.
His name is also spelled in different ways.
He is still my best candidate, but the more interesting question is: what is the likelihood that he is indeed the man.
And this is where it gets difficult.
What is certainly true is that in 1599 Rudolf asked a commission from one of his main financial advisers You are not allowed to view links. Register or Login to view.. (He did that quite frequently).
In this case it was to acquire a set of books from Karl Widemann, for 500 Taler. Geizkofler was supported somehow by Matthias Peugl, and one or the other described the books as 'selzam', which I tentatively translate as 'unusual'.
The books were sent to Hans Popp, one of Rudolf's 'Kammerdiener' in Prague.
On a side note, around 1586-1587 Widemann was in Prague working for Rudolf and in Trebon working for Vilem Rosenberg. He also knew, or even worked together with Edward Kelly.
The "theory" part of this is that these books are the Voynich MS, still in several parts, or the MS was one of them.
At least one book that Widemann sold to Rudolf (then or at some other time) has been preserved and is now in Leiden: Voss.Chym. Q56 , and that can hardly be qualified as 'unusual'.
Anyway, several sources are still to be followed up, and it isn't going very fast
RE: Who sold the Voynich MS to Rudolf
nablator > 19-07-2018, 04:22 PM
The word "theory" should be reserved for a scientific framework, well supported by facts. In common language it gets used for just about anything, including wild guesses.
I may be wrong (being unaware of all the sources and investigations) - you are the expert - but... isn't the fact that Rudolf II ever owned the manuscript about as well established as the reported opinion by the same Mnišovský in the same (Marci to Kircher) letter that the author was Roger Bacon? I mean, could they both be just guesses?
Quote: One may wonder whether both Marci and Mnišovský would have remembered the essential details correctly. [...] We may safely trust that he correctly remembered Mnišovský's words.
davidjackson > 19-07-2018, 06:55 PM
I'm just wondering where you're going with that Edward Kelly remark - because that's a red flag to a bull in some quarters
Seriously however, is there any way of crosslinking his known purchases for Rudolph with any of the catalogues of his collection?
If one were to be very precise, my 'theory' might be just a 'hypothesis', but in practice it doesn't really make a great difference.
I am critical about this theory/hypothesis, and I am still collecting evidence. There are several important sources that I have not yet been able to access, which may either help nothing at all, or provide relevant further evidence.
With respect to the question:
Quote: isn't the fact that Rudolf II ever owned the manuscript about as well established as the reported opinion by the same Mnišovský in the same (Marci to Kircher) letter that the author was Roger Bacon? I mean, could they both be just guesses?
the answer is a definite 'no'.
The Marci letter clearly expresses the first as a statement of fact, and the second as a statement of opinion.
With respect to Kelly, there is quite some literature about Widemann, where this is reported.
I have a scan of a short notebook of Widemann with alchemical recipes, where there should be a reference to Kelly, but I have to admit that I could not identify it.
Kelly remains a difficult person, especially if one tries to find out what he really was about. However, it is well established that for a long time he was one of the most respected alchemists for Rudolf and for the Rosenbergs. Even if he most probably fooled them.
Finally, with respect to David's question about catalogues and known purchases, this is where it gets really interesting, and it is also not possible to adequately describe it. I will have to keep that for the hypothetical occasion that I do find some positive confirmation.
Rudolf basically had two book collections, there was one more (the imperial library in Vienna) to which he contributed and could claim access, and another which belonged to the Habsburgs but he had no rights whatsoever (Ambras collection).
Of the first two, there are several catalogues of one (the Kunstkammer) and none of the more interesting second one
There is a *huge* amount of archival information about his purchases of just about anything, including books. In 2012 I knew of about 20 book references (this is also the state of the information at my web site) but I have a lot more now. It is possible to link numerous of these purchases to the Kunstkammer or to the Viennese library, but of course not to the uncatalogued collection(s).
There are numerous publications about all this. A good recent article is:
Richterová, A.: Alchemical Manuscripts in the collections of Rudolf II. In: You are not allowed to view links. Register or Login to view., pp. 249-291.
The state of my research can be summarised as follows:
- Among the known records of book acquisitions by Rudolf, this very much seems to be the most likely one
- The ratio between known records and undocumented book acquisitions remains unclear, but has improved a lot since 2012
- There is only a lukewarm indication that this particular sale could be it, and I need something much more concrete before I would make more definite claims.
It all sounds very interesting! I look forward to hearing how you progress.
Anton > 20-07-2018, 01:17 AM
Regarding Rudolf, what was said in the letter was just a report of what Mnišovský allegedly said to Marci.
So for Rudolf's owning the MS to be a fact, Marci's report to Kircher must have been true, and Mnišovský report to Marci must have been as well.
That's the strict approach to the question of facts.
But on the other hand there are not many considerations, if any, to state that they were swindling each other on this matter.
How do 500 taler relate to 600 ducat?
Upon a quick wikipedia check, I recognize that at the moment in question taler was 22.91g of silver while ducat was 3.44g of gold.
Hmm... well, had it been talers, Mnisovski would have said talers, not ducats, would not he?
VViews > 20-07-2018, 08:22 AM
Fascinating ReneZ!
500 taler...
Based on the taler value quoted by Anton, that's a much better deal than the Siloe edition, especially if for that price he actually got the Voynich + a whole bundle of "selzam" manuscripts.
ReneZ > 20-07-2018, 08:57 AM
(20-07-2018, 01:25 AM)Anton Wrote: You are not allowed to view links. Register or Login to view. How do 500 taler relate to 600 ducat?
500 Taler was close to 600 (gold) florins. 600 ducats would be some 10% more than that.
After 1620 the Taler was deliberately deprecated, so it even makes sense for Mnisowsky not to talk about Talers.
500 Talers was much less in the 1630's than during Rudolf's time.
Anyway, this is of course speculation.
600 ducats was roughly 2 kg of gold.
When Voynich asked 100,000 dollars for the MS, he was asking *a lot* more than that.
Of course, he did not manage to sell it for that price, but he sold one of the other MS's for 75,000 dollars.
DONJCH > 20-07-2018, 12:12 PM
Anton, as of right now, gold price is US$1224/oz and silver US$15.35, a ratio almost exactly 80:1.
So your ducat is worth over 10 times more than your taler.
Could have been a slip of the tongue though, or perhaps an exaggeration - but if so why?
Edit: Rene beat me to it! I defer to his greater knowledge, yet I note the figures do not all add up.
Silver must have been a lot more valuable back then. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 577 | [
128000,
15546,
6216,
279,
29179,
1910,
718,
10504,
311,
48538,
8255,
198,
1360,
1055,
685,
612,
3925,
198,
49,
1994,
57,
871,
220,
777,
12,
2589,
12,
679,
23,
11,
220,
2839,
25,
4103,
5975,
198,
791,
4062,
4320,
374,
25,
358,
1541,
956,
1440,
11,
719,
735,
16355,
12722,
14618,
704,
512,
20031,
25,
358,
617,
264,
10334,
922,
889,
6216,
279,
10504,
311,
48538,
8255,
627,
19182,
11,
439,
279,
24113,
5605,
5900,
11,
330,
14965,
2795,
362,
11,
2011,
2019,
426,
702,
40,
9932,
264,
836,
304,
856,
220,
679,
17,
15864,
304,
37912,
51972,
4193,
606,
13,
1115,
374,
279,
5033,
91201,
28378,
11,
1370,
582,
2053,
276,
323,
47913,
33053,
35131,
48740,
80998,
627,
16366,
836,
374,
1101,
68918,
304,
2204,
5627,
627
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
15546,
6216,
279,
29179,
1910,
718,
10504,
311,
48538,
8255,
198,
1360,
1055,
685,
612,
3925,
198,
49,
1994,
57,
871,
220,
777,
12,
2589,
12,
679,
23,
11,
220,
2839,
25,
4103,
5975,
198,
791,
4062,
4320,
374,
25,
358,
1541,
956,
1440,
11,
719,
735,
16355,
12722,
14618,
704,
512,
20031,
25,
358,
617,
264,
10334,
922,
889,
6216,
279,
10504,
311,
48538,
8255,
627,
19182,
11,
439,
279,
24113,
5605,
5900,
11,
330,
14965,
2795,
362,
11,
2011,
2019,
426,
702,
40,
9932,
264,
836,
304,
856,
220,
679,
17,
15864,
304,
37912,
51972,
4193,
606,
13,
1115,
374,
279,
5033,
91201,
28378,
11,
1370,
582,
2053,
276,
323,
47913,
33053,
35131,
48740,
80998,
627,
16366,
836,
374,
1101,
68918,
304,
2204,
5627,
627,
-100
] |
Image courtesy of Shutterstock.com
Sales and Marketing Security
IAB launches an anti-fraud campaign for the ad industry
Candice So
@candice_so
The Interactive Advertising Bureau (IAB) is kickstarting a campaign that will try to keep other industries accountable when it comes to ad fraud.
Today, the IAB released its "Anti-Fraud Principles," a set of rules saying ad sellers have to invest in technology and start adopting business practices that would help them identify ad bots and sketchy ad sellers – essentially protecting marketers from buying illegitimate inventory. The trade organization said it will also require ad sellers to be able to explain what their tech and business processes, the Wall Street Journal reported today.
In a press release, the IAB said it would also expect suppliers to identify sources of inventory, and to be able to assure buyers they are working with legitimate sources. For example, suppliers could provide their buyers with specific links and URLs, showing them where their ads will be placed.
The IAB also said it will be rolling out standardized definitions of some of the marketing terms used in the industry, like 'hijacked device,' 'data-center traffic,' 'AdWare traffic,' 'cookie-stuffing,' and so on, ensuring everyone has the same understanding of what the terms mean when they're completing their sales.
"Publishers, ad networks and exchanges have an obligation to detect fraudulent traffic and to not sell it. Clearly people are selling fraudulent inventory today," said Mike Zaneis, IAB's executive vice-president, in an interview with the WSJ.
"This notion of simply getting the entire industry to agree that we shall not sell fraudulent inventory is going to send some shockwaves. A lot of people are just doing business as usual and life is good, but taking a stand and saying we're not as healthy as we need to be will be a major step for the entire industry."
The IAB has also created a new working group, which aims to identify and fight off malware attacks.
Original Article Source
iPhone 6 upsides and downsides for business
Google Analytics adds industry benchmarking feature
Sales and Marketing, Security
digital advertising, digital marketers, digital marketing, fraud, IAB, IAB Canada, inventory, Malware, online fraud, supply chain, wall street journal
About Candice So
Candice is a graduate of Carleton University and has worked in several newsrooms as a freelance reporter and intern, including the Edmonton Journal, the Ottawa Citizen, the Globe and Mail, and the Windsor Star. Candice is a dog lover and a coffee drinker.
Follow Follow @candice_so on Twitter Join Candice So on LinkedIn Candice So on Gooogle+
Malware is going to get weirder in 2020, so it's time for enterprises to get weird too, says Trend Micro exec
Lack of cybersecurity training still a major issue, says Scalar study
Advancements in malware have changed the landscape of cybersecurity, says eSentire
Industry anti-messaging abuse group meets this week in Montreal | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 9,184 | [
128000,
1945,
27104,
315,
85142,
916,
198,
36518,
323,
18729,
8398,
198,
40,
1905,
38175,
459,
7294,
2269,
99057,
4901,
369,
279,
1008,
5064,
198,
34,
438,
560,
2100,
198,
91016,
438,
560,
40933,
198,
791,
42966,
47423,
22555,
320,
40,
1905,
8,
374,
10536,
40389,
264,
4901,
430,
690,
1456,
311,
2567,
1023,
19647,
36977,
994,
433,
4131,
311,
1008,
16515,
627,
15724,
11,
279,
358,
1905,
6004,
1202,
330,
33749,
7424,
99057,
58014,
1359,
264,
743,
315,
5718,
5605,
1008,
37249,
617,
311,
2793,
304,
5557,
323,
1212,
48810,
2626,
12659,
430,
1053,
1520,
1124,
10765,
1008,
50629,
323,
26610,
88,
1008,
37249,
1389,
16168,
22973,
55572,
505,
12096,
30067,
71850,
15808,
13,
578,
6696,
7471,
1071,
433,
690,
1101,
1397,
1008,
37249,
311,
387,
3025
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
1945,
27104,
315,
85142,
916,
198,
36518,
323,
18729,
8398,
198,
40,
1905,
38175,
459,
7294,
2269,
99057,
4901,
369,
279,
1008,
5064,
198,
34,
438,
560,
2100,
198,
91016,
438,
560,
40933,
198,
791,
42966,
47423,
22555,
320,
40,
1905,
8,
374,
10536,
40389,
264,
4901,
430,
690,
1456,
311,
2567,
1023,
19647,
36977,
994,
433,
4131,
311,
1008,
16515,
627,
15724,
11,
279,
358,
1905,
6004,
1202,
330,
33749,
7424,
99057,
58014,
1359,
264,
743,
315,
5718,
5605,
1008,
37249,
617,
311,
2793,
304,
5557,
323,
1212,
48810,
2626,
12659,
430,
1053,
1520,
1124,
10765,
1008,
50629,
323,
26610,
88,
1008,
37249,
1389,
16168,
22973,
55572,
505,
12096,
30067,
71850,
15808,
13,
578,
6696,
7471,
1071,
433,
690,
1101,
1397,
1008,
37249,
311,
387,
3025,
-100
] |
- 250xTransparent Yellow Vinyl
Gatefold Sleeve
- 220x Side A/B Red/Blue Vinyl
- 30x Ultra LTD "Valley Edition"
Side A/B Red/Blue Vinyl
Special art insert
Band & Label Stickers
Artwork by: Adam Burke / Nightjarillustration
Electric Mountain is a heavy rock band from Mexico City, formed in 2013. Influenced by 70s rock and 90s desert/ stoner rock. Conformed by guitarist/vocalist Gibran Pérez, drummer Max Cabrera and bassist Jorge Trejo. The power trio is notorious for being a very loud and energetic live act. Fuzzy guitars, thunderous drums and a thick dirty bass is the name of the game. In 2017 they released their first self-titled album, released on cd by LSDR and on vinyl by Electric Valley Records.
They have shared the stage with bands like Elder and Blackwater Holylight amongst several other bands.
After a 2 year hiatus Electric Mountain is back with their second album, with a more mature and intricate sound, signed with Electric Valley Records.
The band is determined to take over every stage they set foot on. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 6,377 | [
128000,
12,
220,
5154,
87,
58460,
26541,
54634,
198,
43418,
20557,
61362,
198,
12,
220,
8610,
87,
17072,
362,
16675,
3816,
14,
10544,
54634,
198,
12,
220,
966,
87,
29313,
51285,
330,
2257,
3258,
14398,
702,
16789,
362,
16675,
3816,
14,
10544,
54634,
198,
20989,
1989,
5774,
198,
34844,
612,
9587,
800,
40189,
198,
9470,
1816,
555,
25,
15387,
50723,
611,
13120,
19571,
83718,
367,
198,
65965,
19149,
374,
264,
8987,
7091,
7200,
505,
12550,
4409,
11,
14454,
304,
220,
679,
18,
13,
88654,
5886,
555,
220,
2031,
82,
7091,
323,
220,
1954,
82,
24521,
14,
357,
27674,
7091,
13,
1221,
10365,
555,
62740,
5574,
3768,
380,
29479,
6713,
80967,
23577,
11,
69046,
7639,
99894,
2473,
323,
22253,
380,
56500,
12758,
7453,
13,
578,
2410,
35062,
374,
44081
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
12,
220,
5154,
87,
58460,
26541,
54634,
198,
43418,
20557,
61362,
198,
12,
220,
8610,
87,
17072,
362,
16675,
3816,
14,
10544,
54634,
198,
12,
220,
966,
87,
29313,
51285,
330,
2257,
3258,
14398,
702,
16789,
362,
16675,
3816,
14,
10544,
54634,
198,
20989,
1989,
5774,
198,
34844,
612,
9587,
800,
40189,
198,
9470,
1816,
555,
25,
15387,
50723,
611,
13120,
19571,
83718,
367,
198,
65965,
19149,
374,
264,
8987,
7091,
7200,
505,
12550,
4409,
11,
14454,
304,
220,
679,
18,
13,
88654,
5886,
555,
220,
2031,
82,
7091,
323,
220,
1954,
82,
24521,
14,
357,
27674,
7091,
13,
1221,
10365,
555,
62740,
5574,
3768,
380,
29479,
6713,
80967,
23577,
11,
69046,
7639,
99894,
2473,
323,
22253,
380,
56500,
12758,
7453,
13,
578,
2410,
35062,
374,
44081,
-100
] |
Description: Bob Evans Restaurant 2045 is a business categorized under eating places, which is part of the larger category eating places. Bob Evans Restaurant 2045 is located at the address 50 Morningside Drive in Waverly, Ohio 45690-1279. The General Manager is Debbie Napper who can be contacted at (740)947-7125.
Location & access map for "Bob Evans Restaurant 2045" | {
"redpajama_set_name": "RedPajamaC4"
} | 2,664 | [
128000,
5116,
25,
14596,
30563,
26568,
220,
7854,
20,
374,
264,
2626,
71974,
1234,
12459,
7634,
11,
902,
374,
961,
315,
279,
8294,
5699,
12459,
7634,
13,
14596,
30563,
26568,
220,
7854,
20,
374,
7559,
520,
279,
2686,
220,
1135,
386,
52785,
579,
16542,
304,
468,
7403,
398,
11,
14689,
220,
10961,
1954,
12,
6804,
24,
13,
578,
3331,
10790,
374,
64489,
452,
3183,
889,
649,
387,
25559,
520,
320,
21112,
8,
26511,
12,
22708,
20,
627,
4812,
612,
2680,
2472,
369,
330,
33488,
30563,
26568,
220,
7854,
20,
1,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
5116,
25,
14596,
30563,
26568,
220,
7854,
20,
374,
264,
2626,
71974,
1234,
12459,
7634,
11,
902,
374,
961,
315,
279,
8294,
5699,
12459,
7634,
13,
14596,
30563,
26568,
220,
7854,
20,
374,
7559,
520,
279,
2686,
220,
1135,
386,
52785,
579,
16542,
304,
468,
7403,
398,
11,
14689,
220,
10961,
1954,
12,
6804,
24,
13,
578,
3331,
10790,
374,
64489,
452,
3183,
889,
649,
387,
25559,
520,
320,
21112,
8,
26511,
12,
22708,
20,
627,
4812,
612,
2680,
2472,
369,
330,
33488,
30563,
26568,
220,
7854,
20,
1,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
sKitz Kraven is an American rapper, singer, and songwriter from Sun Prairie, Wisconsin currently living in Los Angeles, California.
With a horrorcore aesthetic and a versatile catalog, sKitz Kraven is making a large impact in the underground hip hop scene. Kraven is best known for his most popular singles "Magic" and "That's All".
After releasing an EP titled After Hours, 2 mixtapes ( Wonderland and Black Snow) and 2 compilation albums ( #NewMusicMondays (The Collection) and #NewMusicMondays (The Collection Vol. 2)), Kravenhas gained a cult following with a worldwide fan base. With his dark sound, intense rhyme scheme and in-your-face delivery, sKitz Kraven is impossible to ignore. | {
"redpajama_set_name": "RedPajamaC4"
} | 1,224 | [
128000,
82,
7850,
89,
16852,
5389,
374,
459,
3778,
50437,
11,
23597,
11,
323,
85757,
505,
8219,
72049,
11,
21073,
5131,
5496,
304,
9853,
12167,
11,
7188,
627,
2409,
264,
22169,
2202,
37637,
323,
264,
33045,
16808,
11,
274,
7850,
89,
16852,
5389,
374,
3339,
264,
3544,
5536,
304,
279,
26326,
18638,
7598,
6237,
13,
16852,
5389,
374,
1888,
3967,
369,
813,
1455,
5526,
17845,
330,
44638,
1,
323,
330,
4897,
596,
2052,
23811,
6153,
28965,
459,
19613,
25891,
4740,
30192,
11,
220,
17,
6651,
83,
9521,
320,
90024,
323,
5348,
19435,
8,
323,
220,
17,
29772,
28785,
320,
674,
3648,
25099,
44,
2159,
954,
320,
791,
11348,
8,
323,
674,
3648,
25099,
44,
2159,
954,
320,
791,
11348,
11119,
13,
220,
17,
5850,
16852,
5389,
4752,
18661
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
82,
7850,
89,
16852,
5389,
374,
459,
3778,
50437,
11,
23597,
11,
323,
85757,
505,
8219,
72049,
11,
21073,
5131,
5496,
304,
9853,
12167,
11,
7188,
627,
2409,
264,
22169,
2202,
37637,
323,
264,
33045,
16808,
11,
274,
7850,
89,
16852,
5389,
374,
3339,
264,
3544,
5536,
304,
279,
26326,
18638,
7598,
6237,
13,
16852,
5389,
374,
1888,
3967,
369,
813,
1455,
5526,
17845,
330,
44638,
1,
323,
330,
4897,
596,
2052,
23811,
6153,
28965,
459,
19613,
25891,
4740,
30192,
11,
220,
17,
6651,
83,
9521,
320,
90024,
323,
5348,
19435,
8,
323,
220,
17,
29772,
28785,
320,
674,
3648,
25099,
44,
2159,
954,
320,
791,
11348,
8,
323,
674,
3648,
25099,
44,
2159,
954,
320,
791,
11348,
11119,
13,
220,
17,
5850,
16852,
5389,
4752,
18661,
-100
] |
Thank you for your interest in Saigon South International School. We are truly an international school with over 1000 students from ages 3 - 18 representing more than 35 nationalities and a professional staff of over 110 from 12 countries.
Our curriculum is based upon an American program of studies. Average class sizes of 20 students ensure that all students receive the personalized instruction necessary for success. Our aim is to have a student body that exemplifies our core values and strives for excellence. We are educating the global leaders of tomorrow.
The school seeks to attract and admit students who can benefit from the educational program we offer and who are in agreement with our core values of Academic Excellence, Balance in Life, Sense of Self, Dedicated Service and Respect for All.
Students are considered for admission based on available space, their academic potential, and their parents' commitment toward their child's education in a school where the language of instruction is English. As an international school committed to diversity, the school's admissions policy seeks to ensure a balance of cultures and nationalities in each class.
Because many of our classes reach capacity early in the school year, it is important to submit applications as soon as possible. I look forward to hearing from you and am happy to answer any questions you may have. When you arrive in the HCMC, please contact our Admissions Office if you have questions or would like a tour of the school. Our school video on this website does a good job in presenting an overview of SSIS, but nothing is better than seeing the school for yourself.
Once again, thank you for your interest in SSIS, and I look forward to meeting you and your family. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,764 | [
128000,
13359,
499,
369,
701,
2802,
304,
16233,
74981,
4987,
7327,
6150,
13,
1226,
527,
9615,
459,
6625,
2978,
449,
927,
220,
1041,
15,
4236,
505,
17051,
220,
18,
482,
220,
972,
14393,
810,
1109,
220,
1758,
5426,
1385,
323,
264,
6721,
5687,
315,
927,
220,
5120,
505,
220,
717,
5961,
627,
8140,
30676,
374,
3196,
5304,
459,
3778,
2068,
315,
7978,
13,
24478,
538,
12562,
315,
220,
508,
4236,
6106,
430,
682,
4236,
5371,
279,
35649,
7754,
5995,
369,
2450,
13,
5751,
9395,
374,
311,
617,
264,
5575,
2547,
430,
39039,
9803,
1057,
6332,
2819,
323,
75651,
369,
38656,
13,
1226,
527,
67805,
279,
3728,
6164,
315,
16986,
627,
791,
2978,
26737,
311,
9504,
323,
17113,
4236,
889,
649,
8935,
505,
279,
16627,
2068,
584,
3085,
323
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
13359,
499,
369,
701,
2802,
304,
16233,
74981,
4987,
7327,
6150,
13,
1226,
527,
9615,
459,
6625,
2978,
449,
927,
220,
1041,
15,
4236,
505,
17051,
220,
18,
482,
220,
972,
14393,
810,
1109,
220,
1758,
5426,
1385,
323,
264,
6721,
5687,
315,
927,
220,
5120,
505,
220,
717,
5961,
627,
8140,
30676,
374,
3196,
5304,
459,
3778,
2068,
315,
7978,
13,
24478,
538,
12562,
315,
220,
508,
4236,
6106,
430,
682,
4236,
5371,
279,
35649,
7754,
5995,
369,
2450,
13,
5751,
9395,
374,
311,
617,
264,
5575,
2547,
430,
39039,
9803,
1057,
6332,
2819,
323,
75651,
369,
38656,
13,
1226,
527,
67805,
279,
3728,
6164,
315,
16986,
627,
791,
2978,
26737,
311,
9504,
323,
17113,
4236,
889,
649,
8935,
505,
279,
16627,
2068,
584,
3085,
323,
-100
] |
We have handpicked these expeditions so that you can get the most out of your holiday. Be that climbing, mountain biking, road biking or hiking. We've made sure our itineraries are flexible and accommodating, so we can tailor your chosen trip specifically for you.
Our duty of care for you is the most important part of our expeditions, both physically and financially. We offer a 100% satisfaction guarantee, extensive insurance policies and guaranteed departures.
Our guides are all experienced and hold the best qualifications for the job. Some expeditions have a pre-trip weekend meet, this is where you can get to know your guides, talk about kit and hear stories of past expeditions.
We've created our expeditions to ensure you can soak up the culture. We are committed to traveling sustainably, giving back to the local economy and investing in our planet's future. | {
"redpajama_set_name": "RedPajamaC4"
} | 3,859 | [
128000,
1687,
617,
1450,
94599,
1521,
31727,
6055,
779,
430,
499,
649,
636,
279,
1455,
704,
315,
701,
13560,
13,
2893,
430,
30608,
11,
16700,
67180,
11,
5754,
67180,
477,
38464,
13,
1226,
3077,
1903,
2771,
1057,
433,
10670,
5548,
527,
19303,
323,
77141,
11,
779,
584,
649,
52056,
701,
12146,
8577,
11951,
369,
499,
627,
8140,
14523,
315,
2512,
369,
499,
374,
279,
1455,
3062,
961,
315,
1057,
31727,
6055,
11,
2225,
22655,
323,
39075,
13,
1226,
3085,
264,
220,
1041,
4,
24617,
15803,
11,
16781,
8276,
10396,
323,
19883,
11776,
1439,
627,
8140,
28292,
527,
682,
10534,
323,
3412,
279,
1888,
43784,
369,
279,
2683,
13,
4427,
31727,
6055,
617,
264,
864,
10398,
575,
9178,
3449,
11,
420,
374,
1405,
499,
649,
636,
311,
1440,
701
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
1687,
617,
1450,
94599,
1521,
31727,
6055,
779,
430,
499,
649,
636,
279,
1455,
704,
315,
701,
13560,
13,
2893,
430,
30608,
11,
16700,
67180,
11,
5754,
67180,
477,
38464,
13,
1226,
3077,
1903,
2771,
1057,
433,
10670,
5548,
527,
19303,
323,
77141,
11,
779,
584,
649,
52056,
701,
12146,
8577,
11951,
369,
499,
627,
8140,
14523,
315,
2512,
369,
499,
374,
279,
1455,
3062,
961,
315,
1057,
31727,
6055,
11,
2225,
22655,
323,
39075,
13,
1226,
3085,
264,
220,
1041,
4,
24617,
15803,
11,
16781,
8276,
10396,
323,
19883,
11776,
1439,
627,
8140,
28292,
527,
682,
10534,
323,
3412,
279,
1888,
43784,
369,
279,
2683,
13,
4427,
31727,
6055,
617,
264,
864,
10398,
575,
9178,
3449,
11,
420,
374,
1405,
499,
649,
636,
311,
1440,
701,
-100
] |
Die Johannisbrücke ist eine Brücke in der Kreisstadt Tirschenreuth in der Oberpfalz.
Die Brücke wurde im 18. Jahrhundert vom Kloster Waldsassen in Auftrag gegeben und überquert den Mühlbach, einen Nebenarm der Waldnaab. Das Baumaterial sind Granitblöcke. Heute führt über die Brücke die vielbefahrene Dammstraße.
Auf den zwei Jochen befinden sich die Statuen des Heiligen Johannes Nepomuk und der Heiligen Helena. Wahrscheinlich waren auf den beiden anderen Steinsockel noch zwei weitere Statuen vorgesehen.
Literatur
Johannisbrücke
Steinbrücke
Straßenbrücke in Bayern
Tirschenreuth
Verkehrsbauwerk im Landkreis Tirschenreuth
Brücke in Europa
Bauwerk in Tirschenreuth | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 3,059 | [
128000,
18674,
27268,
77383,
1347,
19919,
68,
6127,
10021,
3320,
19919,
68,
304,
2761,
30718,
285,
45378,
350,
17260,
7674,
265,
952,
304,
2761,
52245,
16276,
278,
89,
382,
18674,
3320,
19919,
68,
27201,
737,
220,
972,
13,
38519,
71,
1263,
531,
22752,
74741,
3751,
51668,
82,
28376,
304,
26798,
53115,
3980,
43416,
2073,
14104,
447,
531,
3453,
64730,
18442,
35638,
11,
15826,
52809,
268,
2227,
2761,
51668,
3458,
370,
13,
19537,
83320,
2229,
12868,
27622,
275,
2067,
3029,
61373,
13,
1283,
1088,
51332,
3423,
14104,
2815,
3320,
19919,
68,
2815,
37177,
58747,
1494,
48009,
423,
8836,
13645,
24352,
382,
82861,
3453,
41562,
622,
55636,
82716,
268,
9267,
2815,
12442,
10529,
951,
1283,
321,
6569,
55205,
37669,
316,
3178,
2073,
2761,
1283,
321,
6569,
73046,
13,
70690,
95313
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
18674,
27268,
77383,
1347,
19919,
68,
6127,
10021,
3320,
19919,
68,
304,
2761,
30718,
285,
45378,
350,
17260,
7674,
265,
952,
304,
2761,
52245,
16276,
278,
89,
382,
18674,
3320,
19919,
68,
27201,
737,
220,
972,
13,
38519,
71,
1263,
531,
22752,
74741,
3751,
51668,
82,
28376,
304,
26798,
53115,
3980,
43416,
2073,
14104,
447,
531,
3453,
64730,
18442,
35638,
11,
15826,
52809,
268,
2227,
2761,
51668,
3458,
370,
13,
19537,
83320,
2229,
12868,
27622,
275,
2067,
3029,
61373,
13,
1283,
1088,
51332,
3423,
14104,
2815,
3320,
19919,
68,
2815,
37177,
58747,
1494,
48009,
423,
8836,
13645,
24352,
382,
82861,
3453,
41562,
622,
55636,
82716,
268,
9267,
2815,
12442,
10529,
951,
1283,
321,
6569,
55205,
37669,
316,
3178,
2073,
2761,
1283,
321,
6569,
73046,
13,
70690,
95313,
-100
] |
Ancient Marbles to American Shores: Classical Archaeology in the United States. by Stephen Dyson, University of Pennsylvania Press, Philadelphia, 1998.
Archaeology in Biologia Centrali-Americana or Contributions to the Knowledge of the Fauna and Flora of Mexico and Central America, by Alfred Maudsiay, University of Oklahoma Press, Norman. | {
"redpajama_set_name": "RedPajamaC4"
} | 2,922 | [
128000,
89167,
1188,
2947,
39863,
311,
3778,
1443,
4692,
25,
68533,
66102,
2508,
304,
279,
3723,
4273,
13,
555,
18587,
43048,
942,
11,
3907,
315,
20355,
8612,
11,
19895,
11,
220,
2550,
23,
627,
19249,
6043,
2508,
304,
12371,
39073,
10913,
72,
51783,
3444,
477,
97104,
311,
279,
33025,
315,
279,
18145,
8733,
323,
3061,
6347,
315,
12550,
323,
10913,
5270,
11,
555,
42592,
386,
8039,
6455,
352,
11,
3907,
315,
23640,
8612,
11,
41168,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
89167,
1188,
2947,
39863,
311,
3778,
1443,
4692,
25,
68533,
66102,
2508,
304,
279,
3723,
4273,
13,
555,
18587,
43048,
942,
11,
3907,
315,
20355,
8612,
11,
19895,
11,
220,
2550,
23,
627,
19249,
6043,
2508,
304,
12371,
39073,
10913,
72,
51783,
3444,
477,
97104,
311,
279,
33025,
315,
279,
18145,
8733,
323,
3061,
6347,
315,
12550,
323,
10913,
5270,
11,
555,
42592,
386,
8039,
6455,
352,
11,
3907,
315,
23640,
8612,
11,
41168,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
miche mothers day | Sophisticated Diva ~ A.K.A. Along came Polly!
Miche Mother's day shipping deadline!!
While you're shopping– don't miss our "cover your bases" promotion!! Get more for your $$ CLICK HERE for more information. | {
"redpajama_set_name": "RedPajamaC4"
} | 1,339 | [
128000,
76,
12333,
27698,
1938,
765,
34940,
4633,
660,
8940,
64,
4056,
362,
11606,
885,
13,
32944,
3782,
94517,
4999,
44,
12333,
21720,
596,
1938,
11862,
22143,
51447,
8142,
499,
2351,
12185,
4235,
1541,
956,
3194,
1057,
330,
3773,
701,
23963,
1,
20862,
3001,
2175,
810,
369,
701,
27199,
58332,
19804,
369,
810,
2038,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
76,
12333,
27698,
1938,
765,
34940,
4633,
660,
8940,
64,
4056,
362,
11606,
885,
13,
32944,
3782,
94517,
4999,
44,
12333,
21720,
596,
1938,
11862,
22143,
51447,
8142,
499,
2351,
12185,
4235,
1541,
956,
3194,
1057,
330,
3773,
701,
23963,
1,
20862,
3001,
2175,
810,
369,
701,
27199,
58332,
19804,
369,
810,
2038,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
There is a new wave in Open Systems data protection… joining forces EMC and Innovation lead the way with Cross-Platform Data Protection and Non-disruptive Disaster Recovery using high-speed tape, deduplication VTL, or disk storage and high performance System z FICON channels…. NOT your TCP/IP Network.
FDRSOS together with IBM System z and EMC VMAX® with EMC z/SOS present a highly scalable and secure distributed data protection and disaster recovery solution for enterprise Linux on System z, as well as for distributed open systems servers; offering a better way to provide business data and disaster recovery protection, by leveraging the cross system capabilities of z/OS, to move data across high performance System z FICON channels and ensure the highest level of business resiliency.
FDRSOS, a cross platform z/OS solution running on System z, provides the ultimate in enterprise data protection and disaster recovery for AIX, Linux, UNIX, Windows & Linux on System z data. FDRSOS in conjunction with EMC VMAX® with EMC z/SOS (formerly Enterprise Storage Platform (ESP)), dually accessible disk storage, and EMC TimeFinder™ makes open system volume backup non-disruptive, as Open System disks are protected (backup/restore) by z/OS and the System z mainframe using high-speed System tape, de-duplication VTL or disk, over high performance System FICON channels.
FDRSOS data never travels on the network and therefore does not consume TCP/IP CPU resources. Backup and restore is at the volume level and the data transfer is at FICON channel speed.
Backups will, no longer take too long…congest networks...or leave you worrying about a reliable recovery. There is no TCP/IP data transfer to consume CPU resources, with FDRSOS. Data transfer is across high performance System z FICON channels.
EMC VMAX® with EMC z/SOS (formerly ESP) data sharing technology to take Open System & Linux on System z volume backup and restore off your TCP/IP network.
EMC TimeFinder hardware replication to make volume backup non-disruptive.
High performance FICON data transfer for rapid movement of more data in less time.
UPSTREAM/SOS, an option of FDR/UPSTREAM provides FDRSOS users with file level enterprise data protection for AIX, Linux, UNIX, Windows and Linux on System z without putting backup data on the communications network.
Online Database Backup Agents – ORACLE, DB2, MS Exchange, Lotus Notes, etc.
FDRSOS and UPSTREAM/SOS work together with IBM System z high performance FICON and EMC VMAX® Symmetrix storage to ensure the highest level of business resiliency for your AIX, Linux, UNIX, Windows and Linux on System z applications. | {
"redpajama_set_name": "RedPajamaC4"
} | 4,004 | [
128000,
3947,
374,
264,
502,
12330,
304,
5377,
15264,
828,
9313,
1981,
18667,
8603,
74804,
323,
38710,
3063,
279,
1648,
449,
11511,
12,
17745,
2956,
19721,
323,
11842,
10694,
6722,
535,
73378,
35011,
1701,
1579,
30699,
17401,
11,
7836,
455,
1728,
650,
13778,
11,
477,
13668,
5942,
323,
1579,
5178,
744,
1167,
435,
43928,
12006,
21060,
4276,
701,
27754,
85538,
8304,
627,
37,
7842,
50,
3204,
3871,
449,
29022,
744,
1167,
323,
74804,
650,
10809,
12175,
449,
74804,
1167,
11628,
3204,
3118,
264,
7701,
69311,
323,
9966,
4332,
828,
9313,
323,
21426,
13654,
6425,
369,
20790,
14677,
389,
744,
1167,
11,
439,
1664,
439,
369,
4332,
1825,
6067,
16692,
26,
10209,
264,
2731,
1648,
311,
3493,
2626,
828,
323,
21426,
13654,
9313,
11,
555,
77582,
279,
5425,
1887
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
3947,
374,
264,
502,
12330,
304,
5377,
15264,
828,
9313,
1981,
18667,
8603,
74804,
323,
38710,
3063,
279,
1648,
449,
11511,
12,
17745,
2956,
19721,
323,
11842,
10694,
6722,
535,
73378,
35011,
1701,
1579,
30699,
17401,
11,
7836,
455,
1728,
650,
13778,
11,
477,
13668,
5942,
323,
1579,
5178,
744,
1167,
435,
43928,
12006,
21060,
4276,
701,
27754,
85538,
8304,
627,
37,
7842,
50,
3204,
3871,
449,
29022,
744,
1167,
323,
74804,
650,
10809,
12175,
449,
74804,
1167,
11628,
3204,
3118,
264,
7701,
69311,
323,
9966,
4332,
828,
9313,
323,
21426,
13654,
6425,
369,
20790,
14677,
389,
744,
1167,
11,
439,
1664,
439,
369,
4332,
1825,
6067,
16692,
26,
10209,
264,
2731,
1648,
311,
3493,
2626,
828,
323,
21426,
13654,
9313,
11,
555,
77582,
279,
5425,
1887,
-100
] |
Organisers of the OVO Energy Tour of Britain have today launched a new competition to look for the best 'land art' alongside the route of this year's 1,140-kilometre event.
The tradition of creating so-called 'land art' along the route has been a common practice at the OVO Energy Tour of Britain for many years – as with other cycle races around the world. Community groups, schools, businesses and land owners across Britain will be encouraged to take part in the competition during the OVO Energy Tour of Britain, which takes place from Sunday the second to Sunday the ninth of September, and visits South Wales, the West Country, Warwickshire, Cumbria and Nottinghamshire before the final stage in Central London.
"We are delighted to be adding this land art competition to the ways that communities across the country can get involved in the race this September," said OVO Energy Tour of Britain race director Mick Bennett.
"Last year's Nottinghamshire stage in particular saw several fantastic examples of land art created by community groups, and this has inspired us to encourage people across the route this year to show their support and get creative. Over the coming weeks, we will see countless examples of land art during the Tour de France, which will inspire people's creativity."
A panel comprising Mick Bennett, the ITV4 presenting and commentary team and representatives from race organisers SweetSpot will decide the top three pieces of art at the end of this year's event. The winner will receive a trophy and commemorative Tour of Britain prizes, presented in person by race director Mick Bennett, while the runner-up and third-place finisher will also take home trophies for their efforts.
Commenting on the announcement, Des Allen the Nottinghamshire farmer whose sheep-based land art went viral on social media during the 2017 OVO Energy Tour of Britain, added: "We were staggered by the response that our small efforts received last year. We did it as a bit of fun and the response was fantastic. I would urge people to have a go; from a little bit of effort it is sometimes amazing the response you receive." | {
"redpajama_set_name": "RedPajamaC4"
} | 5,427 | [
128000,
24105,
62380,
315,
279,
507,
11417,
12634,
14986,
315,
13527,
617,
3432,
11887,
264,
502,
10937,
311,
1427,
369,
279,
1888,
364,
1974,
1989,
6,
16662,
279,
6149,
315,
420,
1060,
596,
220,
16,
11,
6860,
12934,
321,
4512,
265,
1567,
627,
791,
14135,
315,
6968,
779,
19434,
364,
1974,
1989,
6,
3235,
279,
6149,
706,
1027,
264,
4279,
6725,
520,
279,
507,
11417,
12634,
14986,
315,
13527,
369,
1690,
1667,
1389,
439,
449,
1023,
11008,
21234,
2212,
279,
1917,
13,
12332,
5315,
11,
8853,
11,
9873,
323,
4363,
7980,
4028,
13527,
690,
387,
21190,
311,
1935,
961,
304,
279,
10937,
2391,
279,
507,
11417,
12634,
14986,
315,
13527,
11,
902,
5097,
2035,
505,
7418,
279,
2132,
311,
7418,
279,
43641,
315,
6250,
11,
323,
21728,
4987
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
24105,
62380,
315,
279,
507,
11417,
12634,
14986,
315,
13527,
617,
3432,
11887,
264,
502,
10937,
311,
1427,
369,
279,
1888,
364,
1974,
1989,
6,
16662,
279,
6149,
315,
420,
1060,
596,
220,
16,
11,
6860,
12934,
321,
4512,
265,
1567,
627,
791,
14135,
315,
6968,
779,
19434,
364,
1974,
1989,
6,
3235,
279,
6149,
706,
1027,
264,
4279,
6725,
520,
279,
507,
11417,
12634,
14986,
315,
13527,
369,
1690,
1667,
1389,
439,
449,
1023,
11008,
21234,
2212,
279,
1917,
13,
12332,
5315,
11,
8853,
11,
9873,
323,
4363,
7980,
4028,
13527,
690,
387,
21190,
311,
1935,
961,
304,
279,
10937,
2391,
279,
507,
11417,
12634,
14986,
315,
13527,
11,
902,
5097,
2035,
505,
7418,
279,
2132,
311,
7418,
279,
43641,
315,
6250,
11,
323,
21728,
4987,
-100
] |
Кадастровая стоимость — результат выполненной в соответствии с законодательством оценки стоимости объекта недвижимости на определённую дату, зафиксированный в государственном реестре (кадастре) и используемый, в частности, для целей налогообложения. Такая оценка производится, как правило, в массовом порядке, а не для индивидуальных объектов.
Установление кадастровой стоимости, кадастровая оценка в РФ
Кадастровая стоимость определяется в ходе государственной кадастровой оценки независимыми оценщиками. Порядок проведения государственной кадастровой оценки регулируется Федеральным законом от 29.07.1998 «Об оценочной деятельности в Российской Федерации».
Решение о проведении государственной кадастровой оценки принимают региональные органы власти или органы местного самоуправления, которые выбирают оценщика и заключают с ним договор. Кадастровая оценка проводится не чаще одного раза в три года, но и не реже одного раза в пять лет. В Москве, Санкт-Петербурге и Севастополе переоценка может проводиться не чаще одного раза в два года.
Порядок проведения государственной кадастровой оценки включает совокупность следующих действий:
принятие решения о проведении государственной кадастровой оценки;
формирование перечня объектов недвижимости, подлежащих государственной кадастровой оценке;
отбор исполнителя работ по определению кадастровой стоимости и заключение с ним договора на проведение оценки;
определение кадастровой стоимости и составление отчета об определении кадастровой стоимости (в том числе процедуру ознакомления с проектом отчета об определении кадастровой стоимости);
экспертизу отчета об определении кадастровой стоимости;
утверждение результатов определения кадастровой стоимости;
внесение результатов определения кадастровой стоимости в государственный кадастр недвижимости.
Земельные участки
Кадастровая стоимость земельных участков определяется государством, основываясь на индивидуальных характеристиках каждого земельного участка (в том числе уровень рыночных цен), с применением положений Земельного кодекса Российской Федерации и актах органов местного самоуправления.
К индивидуальным характеристикам земельного участка относят:
территориальное размещение;
площадь земельного участка;
категория земельного участка;
особенность разрешенного использования участка и др.
От кадастровой стоимости земельного участка зависит размер земельного налога, определяемый в соответствии с главой 31 Налогового кодекса.
Оспаривание
Единичная методологическая ошибка, явившаяся следствием игнорирования индивидуальных особенностей оцениваемого объекта, (несоответствие определения кадастровой стоимости положениям методических указаний о государственной кадастровой оценке), допущенная при определении недвижимости, повлиявшая на величину его кадастровой стоимости, может быть оспорена.
Чтобы проверить, возможно ли оспаривать назначенную кадастровую стоимость, имеется возможность получения сведений об объекте недвижимости в территориальном подразделении Росреестра. По статье 24.18 Закона «Об оценочной деятельности в Российской Федерации» ответ на запрос заинтересованного лица заказчик и оценщик должны дать в течение семи рабочих дней.
См. также
Земельный кадастр
Кадастровый паспорт
Кадастровый номер
Примечания
Землеустройство
Земельное право | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 7,238 | [
128000,
27435,
23680,
84350,
24803,
36497,
124887,
4194,
2345,
99300,
99396,
106025,
5927,
116327,
5524,
122430,
105168,
115630,
17165,
104578,
116776,
55053,
1506,
102730,
116128,
116776,
13373,
108228,
104559,
77495,
7952,
103457,
11,
44946,
115485,
2297,
59921,
115910,
5927,
105890,
100854,
94962,
100862,
37277,
100387,
320,
4898,
103251,
122533,
8,
7740,
112516,
10298,
35723,
11,
5927,
102153,
68742,
11,
20440,
39233,
103364,
104750,
22885,
14082,
82941,
18999,
13,
102949,
36497,
115630,
13433,
104905,
97334,
11,
52770,
112515,
11,
5927,
124318,
6856,
12507,
122963,
11,
21022,
19175,
20440,
42078,
111506,
48262,
3865,
106526,
55053,
6856,
382,
41682,
68462,
56892,
124537,
84350,
24803,
16742,
104578,
116776,
11,
124537,
84350,
24803,
36497,
115630,
13433,
5927,
110874,
720,
27435,
23680,
84350,
24803,
36497,
124887,
114151,
50819,
5927,
109136,
1532,
105890,
108865,
124537
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
27435,
23680,
84350,
24803,
36497,
124887,
4194,
2345,
99300,
99396,
106025,
5927,
116327,
5524,
122430,
105168,
115630,
17165,
104578,
116776,
55053,
1506,
102730,
116128,
116776,
13373,
108228,
104559,
77495,
7952,
103457,
11,
44946,
115485,
2297,
59921,
115910,
5927,
105890,
100854,
94962,
100862,
37277,
100387,
320,
4898,
103251,
122533,
8,
7740,
112516,
10298,
35723,
11,
5927,
102153,
68742,
11,
20440,
39233,
103364,
104750,
22885,
14082,
82941,
18999,
13,
102949,
36497,
115630,
13433,
104905,
97334,
11,
52770,
112515,
11,
5927,
124318,
6856,
12507,
122963,
11,
21022,
19175,
20440,
42078,
111506,
48262,
3865,
106526,
55053,
6856,
382,
41682,
68462,
56892,
124537,
84350,
24803,
16742,
104578,
116776,
11,
124537,
84350,
24803,
36497,
115630,
13433,
5927,
110874,
720,
27435,
23680,
84350,
24803,
36497,
124887,
114151,
50819,
5927,
109136,
1532,
105890,
108865,
124537,
-100
] |
The Yashada Administrative Training Institute (ATI), an academy that trains government departments, rural and urban non-officials and stakeholders of Maharashtra state adopted the Urban Nexus approach in their institutions' practice and further worked on some issues of their cities and states using the approach.
Representatives from the Yashada Administrative Training Institute (ATI) for Maharashtra state of India, along with city representatives and training and research institutes attended the Nexus training in Maharashtra on 25 – 26 February 2019 and in New Delhi on 28 February – 1 March 2019.
Following the previous training on Urban Nexus in Delhi last year, some of the ATIs showed interest and immediately put integrated resource management (the Nexus approach) and the new interactive training methods into practice in their own institutions. Integration with the curriculum will follow.
The latest workshops concentrated on improving interinstitutional linkages at all levels of the government as well as integration across the sectors to solve problems in an integrated, holistic and environmentally friendly manner. They protect and manage the three "supply securities" – water, energy and food security – in a balanced manner. To serve as examples for inter-institutional coordination inter-ministerial task forces and committees, round table discussions, dialogue platforms or other inter-agency communication mechanisms have used the Urban Nexus approach as a tool.
More than 30 participants from Maharashtra training institutes and cities worked on concrete infrastructure problems of their cities such as air pollution, waste water and solid waste management. The training method and the Nexus approach enables them to elaborate practical, cross-sectoral solutions to solve the problems. Inter-institutional coordination is always the weakest point. However, it is a "must" if integrated resource management is to take place.
In Delhi, the participants came from training and research institutes and states and cities across the country. This mixture of the participants resulted in a very innovative spirit, new formats of cooperation and understanding as stakeholders from these different sectors rarely get together to work on common problems.
The problems that they worked on included housing in Gurgaon, solid waste management in Jabalpur as well as waste water in Hyderabad and Bangalore. These topics were based on the four national flagship programmes of India, namely "Smart cities programme", "Housing for all", "Swachh Bharat" and the "Amrut" programme. These require integration across levels of government and sectors. Most scientific literature on the Nexus focuses on the physical interlinkages between the sectors. The roles of institutional and political Nexus governance have unfortunately received less attention. However, to manage risks, maximise gains and reduce trade-offs, one must not only understand how the Nexus sectors are physically connected but also how they are institutionally linked.
Additionally, the International Agendas (the 2030 Agenda for Sustainable Development and the Paris Climate Agreement) have been integrated into the existing Indian policy programmes guiding the national development following the recommendation that implementation & monitoring should be "country led".
We need management approaches that ensure the sustainability of natural resources. Having "stronger institutions that are better interlinked" is the key to a Nexus approach.
The Nexus approach is a theoretical and at the same time a political concept requesting integrated resource management. It is a "reminder" not to overexploit the natural resources water, energy and land, analysing the interlinkages between the three sectors of water, energy and food security with the ultimate goal of identifying synergies and minimising trade-offs between the sectors. It emphasises the key role of institutional relationships and effective coordination mechanisms. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,085 | [
128000,
791,
816,
1003,
2649,
52941,
16543,
10181,
320,
835,
40,
705,
459,
44445,
430,
28788,
3109,
26280,
11,
19624,
323,
16036,
2536,
12744,
7235,
82,
323,
39210,
315,
68519,
1614,
18306,
279,
29422,
41122,
5603,
304,
872,
14673,
6,
6725,
323,
4726,
6575,
389,
1063,
4819,
315,
872,
9919,
323,
5415,
1701,
279,
5603,
627,
66843,
5983,
505,
279,
816,
1003,
2649,
52941,
16543,
10181,
320,
835,
40,
8,
369,
68519,
1614,
315,
6890,
11,
3235,
449,
3363,
24005,
323,
4967,
323,
3495,
94812,
18677,
279,
41122,
4967,
304,
68519,
389,
220,
914,
1389,
220,
1627,
7552,
220,
679,
24,
323,
304,
1561,
22767,
389,
220,
1591,
7552,
1389,
220,
16,
5587,
220,
679,
24,
627,
28055,
279,
3766,
4967,
389,
29422,
41122,
304,
22767,
1566,
1060
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
816,
1003,
2649,
52941,
16543,
10181,
320,
835,
40,
705,
459,
44445,
430,
28788,
3109,
26280,
11,
19624,
323,
16036,
2536,
12744,
7235,
82,
323,
39210,
315,
68519,
1614,
18306,
279,
29422,
41122,
5603,
304,
872,
14673,
6,
6725,
323,
4726,
6575,
389,
1063,
4819,
315,
872,
9919,
323,
5415,
1701,
279,
5603,
627,
66843,
5983,
505,
279,
816,
1003,
2649,
52941,
16543,
10181,
320,
835,
40,
8,
369,
68519,
1614,
315,
6890,
11,
3235,
449,
3363,
24005,
323,
4967,
323,
3495,
94812,
18677,
279,
41122,
4967,
304,
68519,
389,
220,
914,
1389,
220,
1627,
7552,
220,
679,
24,
323,
304,
1561,
22767,
389,
220,
1591,
7552,
1389,
220,
16,
5587,
220,
679,
24,
627,
28055,
279,
3766,
4967,
389,
29422,
41122,
304,
22767,
1566,
1060,
-100
] |
Home Movies Pakistan Talaash: Aashir & Wajahat Rauf's New Song Will Give You Goosebumps!
The 'Tere Bina' famed Aashir Wajahat is back with a new song where the talented singer shares the singing duties with his multitalented father Wajahat Rauf.
In the foot tapping song titled 'Taalash', the father-son duo excel and people are absolutely loving their chemistry in it.
Sadaf Kanwal's New Dance Video Takes The Internet By Storm!
The beats are impressive and the credit for lyrics and composition go to Wajahat Rauf. Seems like the song is ready to hit the charts soon!
In the video, we can see the talented singer and his father presenting their swag as they groove on the beats and enjoy every bit of it.
Aashir Wajahat is the new singing sensation in the music industry and his last song called 'Naya Raasta' managed to get the attention of the masses with a great reach on YouTube.
Before venturing into music as a professional singer, Aashir acted in Karachi Se Lahore and impressed all with his brilliant acting, under the direction of his father Wajahat Rauf while also made a cameo appearance in the sequel Lahore Se Aagey. | {
"redpajama_set_name": "RedPajamaC4"
} | 1,068 | [
128000,
7778,
27019,
17076,
350,
6181,
1003,
25,
362,
1003,
404,
612,
468,
1662,
117560,
18989,
1739,
596,
1561,
19508,
4946,
21335,
1472,
82207,
65,
12055,
4999,
791,
364,
51,
486,
426,
2259,
6,
61403,
362,
1003,
404,
468,
1662,
117560,
374,
1203,
449,
264,
502,
5609,
1405,
279,
23944,
23597,
13551,
279,
26139,
22006,
449,
813,
2814,
2223,
16243,
7126,
468,
1662,
117560,
18989,
1739,
627,
644,
279,
4579,
53728,
5609,
25891,
364,
51,
55442,
1003,
518,
279,
7126,
12,
942,
34821,
25555,
323,
1274,
527,
11112,
21955,
872,
30903,
304,
433,
627,
60765,
2642,
31663,
27495,
596,
1561,
30704,
8519,
38707,
578,
8191,
3296,
22620,
4999,
791,
34427,
527,
16358,
323,
279,
6807,
369,
24142,
323,
18528,
733,
311,
468,
1662,
117560,
18989,
1739,
13,
65057
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
7778,
27019,
17076,
350,
6181,
1003,
25,
362,
1003,
404,
612,
468,
1662,
117560,
18989,
1739,
596,
1561,
19508,
4946,
21335,
1472,
82207,
65,
12055,
4999,
791,
364,
51,
486,
426,
2259,
6,
61403,
362,
1003,
404,
468,
1662,
117560,
374,
1203,
449,
264,
502,
5609,
1405,
279,
23944,
23597,
13551,
279,
26139,
22006,
449,
813,
2814,
2223,
16243,
7126,
468,
1662,
117560,
18989,
1739,
627,
644,
279,
4579,
53728,
5609,
25891,
364,
51,
55442,
1003,
518,
279,
7126,
12,
942,
34821,
25555,
323,
1274,
527,
11112,
21955,
872,
30903,
304,
433,
627,
60765,
2642,
31663,
27495,
596,
1561,
30704,
8519,
38707,
578,
8191,
3296,
22620,
4999,
791,
34427,
527,
16358,
323,
279,
6807,
369,
24142,
323,
18528,
733,
311,
468,
1662,
117560,
18989,
1739,
13,
65057,
-100
] |
Need Boxes? If it's corrugated cardboard….. We make it!
Many sizes in stock available for immediate shipping. Cardboard boxes to fit books, bottles, printed sheets, CD's, DVD's.
Need Boxes? If it's corrugated cardboard…..
Echo Cartons is a family run business that has built its reputation on the superior turn around time we offer on both our quotations and most importantly, YOUR BOXES. With in house design capabilities, we can accommodate our customers' every packaging needs. "No packaging solution is too hard, some just require a little more thought." Echo Cartons can help you create innovative boxes and stands to protect and display your products.
We also hold a huge number of corrugated boxes in stock. Customers can choose from our standard size box range in our online store. These cardboard boxes are offered in a range of styles and sizes and are suitable for most standard shipping applications. You can rest assured that any orders you place online or any requests for quotations or further information will be dealt with in an efficient and professional manner. | {
"redpajama_set_name": "RedPajamaC4"
} | 3,651 | [
128000,
24581,
72367,
30,
1442,
433,
596,
45453,
773,
660,
55043,
53263,
1226,
1304,
433,
4999,
8607,
12562,
304,
5708,
2561,
369,
14247,
11862,
13,
6938,
2541,
15039,
311,
5052,
6603,
11,
27474,
11,
17124,
25112,
11,
11325,
596,
11,
18584,
596,
627,
24581,
72367,
30,
1442,
433,
596,
45453,
773,
660,
55043,
1981,
35047,
76094,
13416,
2439,
374,
264,
3070,
1629,
2626,
430,
706,
5918,
1202,
17444,
389,
279,
16757,
2543,
2212,
892,
584,
3085,
389,
2225,
1057,
87087,
323,
1455,
23659,
11,
21592,
53783,
1600,
13,
3161,
304,
3838,
2955,
17357,
11,
584,
649,
29376,
1057,
6444,
6,
1475,
24066,
3966,
13,
330,
2822,
24066,
6425,
374,
2288,
2653,
11,
1063,
1120,
1397,
264,
2697,
810,
3463,
1210,
38906,
13416,
2439,
649,
1520,
499,
1893,
18699
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
24581,
72367,
30,
1442,
433,
596,
45453,
773,
660,
55043,
53263,
1226,
1304,
433,
4999,
8607,
12562,
304,
5708,
2561,
369,
14247,
11862,
13,
6938,
2541,
15039,
311,
5052,
6603,
11,
27474,
11,
17124,
25112,
11,
11325,
596,
11,
18584,
596,
627,
24581,
72367,
30,
1442,
433,
596,
45453,
773,
660,
55043,
1981,
35047,
76094,
13416,
2439,
374,
264,
3070,
1629,
2626,
430,
706,
5918,
1202,
17444,
389,
279,
16757,
2543,
2212,
892,
584,
3085,
389,
2225,
1057,
87087,
323,
1455,
23659,
11,
21592,
53783,
1600,
13,
3161,
304,
3838,
2955,
17357,
11,
584,
649,
29376,
1057,
6444,
6,
1475,
24066,
3966,
13,
330,
2822,
24066,
6425,
374,
2288,
2653,
11,
1063,
1120,
1397,
264,
2697,
810,
3463,
1210,
38906,
13416,
2439,
649,
1520,
499,
1893,
18699,
-100
] |
HEXO+ review: does this crowd-funded drone fly without wings, or plummet to Earth?
And can the HEXO+ compete with drones from Parrot, DJI and 3D Robotics?
Accurate tracking
App is glitch free
Lengthy charging time
No obstacle-avoidance tech
By T3 Magazine
Domestic drones have become huge business for brands like DJI, Parrot and 3D Robotics, these stylish, app-connected aerialphotography quadcopters giving thrill-seekers an alternative to strapping on a GoPro, and opening up new doors for extreme selfies.
But now, a new kind of drone is taking to the skies. Over the past 18 months or so, we've seen a number of 'autonomous' drones being launched via Kickstarter. That means no complex controls to learn – these drones will follow your every move, hands-free, whether you're thrashing down a mountain on a bike or shredding deep powder on an Alpine black run.
On paper, the most powerful of these drones is the Hexo+. So how does it measure up in terms of build quality, performance and price? A key difference with the Hexo+ is its six arm-mounted propellers, which make it a hexacopter rather than the more common quadcopter design. The long plastic body is reminiscent of the baddie-blasting Air Force drones you see on the news. Despite its ample size, the Hexo+ is light enough to be transported to filming locations off the beaten track – even with the GoPro-compatible gimbal attached and a li-po battery installed.
HP Spectre 13 review: this is the MacBook Air Killer
Easy set-up
Assembly is a cinch. Slide the two plastic landing gears into place, screw the colour-coded propellers onto the motors, attach the gimbal to the rails on the drone's belly and plug in the gimbal's power cable. This exposed cable might not survive a bumpy landing, but built-in safety features should ensure that every landing is soft. Still, we'd expect a slicker, more integrated design seeing as we're getting little change from £700.
The battery slots neatly inside the rear of the drone, and charging takes just over an hour via an aftermarket eCube charger. The charger connects to the mains via (in our case) a US plug converted with an AC adaptor, and the battery is connected to the charger via a balance cable. These cables are standard fare in the RC world but, as we all strive to go cable- and clutterfree, two separate cables and an adaptor for charging seems excessive. Hopefully, there will be a simplified, Hexo-specific solution in the future.
Additional batteries cost £90 each. That's cheaper than other brands, but still steep considering the average 15 minutes of fl ight time per battery (dependent on conditions and which camera movements are selected).
The Hexo+ uses a phone's GPS position via the free Hexo+ app, along with four other sensors (accelerometer, gyroscope, barometer, magnetometer) to pinpoint where the subject is and how it's moving to ensure optimum tracking and framing. It takes just 21 seconds from switching the drone on to it syncing with GPS, and connecting your phone to the drone via Bluetooth is a doddle. When you fi rst open the app, there are some simple pre-flight checks – and, of course, you'll need to agree to the conditions of use.
Before shooting your first frames, conduct a few test runs to learn how the Hexo+ goes about its business. When you select one of the 12 available camera movements – we started with a predictable Hover Close – the drone takes off and makes four 90-degree turns to calibrate before flying into position, where it hovers, ready to execute the camera movement. We can't emphasise enough how quickly this process happens, and if space is limited, the drone will crash.
Once you get a feel for how the Hexo+ reacts, you can choose the best spots to film, but it's safe to say that trees and power lines are a no-no for this device. Hexo says that "obstacle avoidance tech available today isn't quite cutting it in our eyes", but DJI's new Phantom 4 has surely moved this to the top of the company's to-do list.
PlayStation VR review: is it better than life?
Quirky angles
That aside, the fun really begins when you're comfortable with the drone and ready to shoot. Camera movements are selected by a single tap within the app menu; the drone fl ies into position and awaits your command to Start Shooting. Highlights include Hover High, where the drone sits directly above you, taking in a huge amount of the landscape and moving with the smartphone-wielding subject on the ground. Shooting with this setting on a snow-capped mountain or golden beach would look incredible.
The panoramic 360, Fly In/Out and Slide Sideways modes will all perfectly capture the moment when you conquer your next mountain peak. They could also add quirky angles to an outdoor wedding video.
Follow Me is the most spectacular mode and the main reason to buy this drone. We tested it by hurtling down a sloping field on a mountain bike. High winds added even more for the Hexo+ to tackle, but it kept pace, those six propellers working hard to maintain stability. Reaction to sudden bursts of speed or movement is instant, and the gimbal's 3-axis stabilisation keeps the camera fixed firmly on the subject.
Connection between drone and smartphone is consistently strong, and there's no noticeable difference in drone reflex whether the phone is in your hand, or stowed in your pocket or backpack. Initially, it's disconcerting being followed by an autonomous drone, and the instinct is to keep looking up for reassurance that it's there, but the drone's movements are precise and eventually trust takes over.
GoPros are still the leading action cameras, and the latest Hero 4 Black delivers optimum resolution and frame rate, so you know your footage will be great. Plus, you can upgrade in the future – something that can't be said for fixed-camera drones. This does, however, mean that after paying £700 for the drone, you can't fi lm anything until you shell out for a GoPro.
With the drone airborne, camera movements can be easily changed via the app, and an impending software update will enable users to customise and combine movements for unique shots. This means there's no real need to land the drone for the entirety of a battery's life, unless you decide to change location. Also, there's no facility to control the GoPro from your smartphone after take-off (the camera is strapped to the gimbal, as opposed to any wired connection), so you must switch the camera on and set it to record before the Hexo+ is in the air. This also means you'll need to be happy sifting through footage, and cutting take-off, landing and repositioning sequences from edits.
Google Pixel and Pixel Hands-on Review: is the Pixel perfect?
Superb results
One of the biggest problems we've experienced with other drones is that with forward motion the drone tilts, the gimbal angles to accommodate this shift and the propellers encroach on camera footage. Thankfully, the Hexo+'s props are smaller and positioned deliberately higher than the camera, eradicating this problem.
The main focus for the drone is to capture great footage, and, combined with the stability of the body, the accurate movement of the gimbal and the ability of the GoPro Hero 4, our footage kept up with the subject at all times, producing superb results. We tested in a field on a grey UK day, but the possibilities are limited only by your access to photogenic locations, the weather and your imagination.
Autonomy has its place, then, but what about those who want to feel a controller in their hands? Well, while autonomous flight is this drone's modus operandi, it's also compatible with an RC controller, should you wish to fly manually.
Hexo promises quarterly firmware and app updates, and we've already caught wind of a forthcoming function called Magic Wand, which will open the drone up to Minority Report-style gesture control from your smartphone. We'd also love the option to map GPS points within the app (as offered by DJI's Waypoints fl ight mode). Time will tell how much scope there is for these types of upgrade.
Kickstarter products are rarely perfect from version 1.0, and it's still early days for the Hexo+, but this is an impressive foundation for the fledgling brand to build upon. The price may prove too high for some people, but the Hexo+ is an exciting product with bags of potential.
GoPro Hero5 Black review and sample videos. And we're also taking a look at the GoPro Karma Drone!
Price: £699 | Buy Hexo+
Weight: 1.7kg (with gimbal and battery installed)
Camera: Compatible with GoPro
Max flight time: 15 mins
Charge time: Approx one hour
Battery: 5,000mAh 3S li-po
App requirements: Android 4.4 (Kitkat) and above; iOS 8 and above
Range: 100m (in Follow mode)
Max speed: 70kph
Navigation GPS: Antenna
T3 Style, October 2016: look and feel awesome in autumn
T3 Magazine
T3.com is one of the UK's leading consumer lifestyle websites and T3 magazine is its print counterpart. You can follow us on Twitter, Facebook and Instagram.
We present products in helpful buying guides and carefully curated deals posts across style, living, auto, smart home, watches, travel, fitness and more. We're delighted that 38,000 people buy a copy of T3 magazine every month.
Joint-friendly, no-jump standing dumbbell workout for a full-body blast at home
Grab a couple of small dumbbells and your workout mat, and let's get moving!
By Matt Kollat • Published 31 January 23
New Grand Seiko Spring Drive design is the model you've been waiting for
'Lake Suwa Before Dawn' is a 40mm automatic watch with stainless steel case and no power reserve indicator on the dial!
By Alistair Charlton • Published 31 January 23 | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 6,749 | [
128000,
1837,
55,
46,
10,
3477,
25,
1587,
420,
13734,
50701,
27811,
11722,
2085,
27296,
11,
477,
71278,
311,
9420,
5380,
3112,
649,
279,
73321,
46,
10,
20874,
449,
38332,
505,
4366,
4744,
11,
22102,
40,
323,
220,
18,
35,
77564,
5380,
14945,
62259,
15194,
198,
2213,
374,
62184,
1949,
198,
4472,
88,
23468,
892,
198,
2822,
33287,
12,
48956,
685,
13312,
198,
1383,
350,
18,
22168,
198,
23658,
10027,
38332,
617,
3719,
6908,
2626,
369,
16097,
1093,
22102,
40,
11,
4366,
4744,
323,
220,
18,
35,
77564,
11,
1521,
32461,
11,
917,
73288,
41884,
52399,
5814,
28181,
1030,
418,
388,
7231,
54904,
7962,
1247,
388,
459,
10778,
311,
610,
3713,
389,
264,
6122,
1360,
11,
323,
8736,
709,
502,
14365,
369,
14560,
86397,
627,
4071,
1457,
11
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
1837,
55,
46,
10,
3477,
25,
1587,
420,
13734,
50701,
27811,
11722,
2085,
27296,
11,
477,
71278,
311,
9420,
5380,
3112,
649,
279,
73321,
46,
10,
20874,
449,
38332,
505,
4366,
4744,
11,
22102,
40,
323,
220,
18,
35,
77564,
5380,
14945,
62259,
15194,
198,
2213,
374,
62184,
1949,
198,
4472,
88,
23468,
892,
198,
2822,
33287,
12,
48956,
685,
13312,
198,
1383,
350,
18,
22168,
198,
23658,
10027,
38332,
617,
3719,
6908,
2626,
369,
16097,
1093,
22102,
40,
11,
4366,
4744,
323,
220,
18,
35,
77564,
11,
1521,
32461,
11,
917,
73288,
41884,
52399,
5814,
28181,
1030,
418,
388,
7231,
54904,
7962,
1247,
388,
459,
10778,
311,
610,
3713,
389,
264,
6122,
1360,
11,
323,
8736,
709,
502,
14365,
369,
14560,
86397,
627,
4071,
1457,
11,
-100
] |
Home Politics 2023 Presidency: I will commence consultation extensively, make it public after —...
2023 Presidency: I will commence consultation extensively, make it public after — Tambuwal
Governor Aminu Tambuwal of Sokoto State and Chairperson of the Peoples Democratic Party (PDP) Governors' Forum has said that he will begin consultation "extensively" and make public his decision on whether to run for office of president of Nigeria in 2023.
Tambuwal disclosed this in a recent interview when asked if he has an ambition to contest, noting that he is a one-time presidential aspirant.
"You know that this period, we have been working to reposition the party. Without the party platform together and stabilized, what is ambition? You have to have a platform before you can talk about ambition. Now that we have almost done all the Congresses and conventions, I will come back to you after consulting in a matter of a few weeks, few months," Tambuwal said.
"I have tried it before. It (presidential ambition) was in air in 2014. After consultation, I decided not to run. In 2018, after consultations with a number of stakeholders I threw my hat into the race. I will commence my consultation extensively now and make it public after."
The PDP has thrown open the zoning for the presidency to all regions.
2023 Presidency
Aminu Tambuwal
Previous articleBuhari arrives Paris for official visit, peace forum
Next articleKano man expresses interest to become APC national women's leader | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 7,459 | [
128000,
7778,
35979,
220,
2366,
18,
87748,
25,
358,
690,
56445,
29173,
42817,
11,
1304,
433,
586,
1306,
2001,
9522,
2366,
18,
87748,
25,
358,
690,
56445,
29173,
42817,
11,
1304,
433,
586,
1306,
2001,
59226,
84,
27495,
198,
78706,
269,
362,
1083,
84,
59226,
84,
27495,
315,
85214,
2117,
3314,
323,
16478,
9164,
315,
279,
81398,
11650,
8722,
320,
47,
10510,
8,
91089,
6,
17997,
706,
1071,
430,
568,
690,
3240,
29173,
330,
428,
28014,
1,
323,
1304,
586,
813,
5597,
389,
3508,
311,
1629,
369,
5274,
315,
4872,
315,
29258,
304,
220,
2366,
18,
627,
51,
3042,
84,
27495,
36489,
420,
304,
264,
3293,
7274,
994,
4691,
422,
568,
706,
459,
45715,
311,
14130,
11,
27401,
430,
568,
374,
264,
832,
7394,
13621,
25689,
519,
627
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
7778,
35979,
220,
2366,
18,
87748,
25,
358,
690,
56445,
29173,
42817,
11,
1304,
433,
586,
1306,
2001,
9522,
2366,
18,
87748,
25,
358,
690,
56445,
29173,
42817,
11,
1304,
433,
586,
1306,
2001,
59226,
84,
27495,
198,
78706,
269,
362,
1083,
84,
59226,
84,
27495,
315,
85214,
2117,
3314,
323,
16478,
9164,
315,
279,
81398,
11650,
8722,
320,
47,
10510,
8,
91089,
6,
17997,
706,
1071,
430,
568,
690,
3240,
29173,
330,
428,
28014,
1,
323,
1304,
586,
813,
5597,
389,
3508,
311,
1629,
369,
5274,
315,
4872,
315,
29258,
304,
220,
2366,
18,
627,
51,
3042,
84,
27495,
36489,
420,
304,
264,
3293,
7274,
994,
4691,
422,
568,
706,
459,
45715,
311,
14130,
11,
27401,
430,
568,
374,
264,
832,
7394,
13621,
25689,
519,
627,
-100
] |
Book Signing at Mandel Public Library!
http://chroniclesofaserialdater.com/wp-content/uploads/2017/01/Ann-Marie-Book-Signing-Mandel.png 800 800 Ann Marie http://chroniclesofaserialdater.com/wp-content/uploads/2017/02/serialdaterlogov2.png Ann Marie2017-07-07 15:31:182017-07-07 15:31:18Book Signing at Mandel Public Library!
http://chroniclesofaserialdater.com/wp-content/uploads/2017/01/Chronicles-of-a-Serial-Dater-All-Events-570x800-web.jpg 800 570 Ann Marie http://chroniclesofaserialdater.com/wp-content/uploads/2017/02/serialdaterlogov2.png Ann Marie2017-03-08 14:47:432017-03-08 14:47:43Book Launch Events Announced! | {
"redpajama_set_name": "RedPajamaC4"
} | 637 | [
128000,
7280,
88524,
520,
24789,
301,
3142,
11896,
4999,
1277,
1129,
7562,
4440,
1073,
300,
2918,
28563,
916,
31846,
6951,
30681,
14,
679,
22,
14,
1721,
14,
28192,
48535,
648,
12,
7280,
6354,
625,
287,
5364,
38221,
3592,
220,
4728,
220,
4728,
9489,
33116,
1795,
1129,
7562,
4440,
1073,
300,
2918,
28563,
916,
31846,
6951,
30681,
14,
679,
22,
14,
2437,
14,
10392,
28563,
848,
869,
17,
3592,
9489,
33116,
679,
22,
12,
2589,
12,
2589,
220,
868,
25,
2148,
25,
10828,
17248,
12,
2589,
12,
2589,
220,
868,
25,
2148,
25,
972,
7280,
88524,
520,
24789,
301,
3142,
11896,
4999,
1277,
1129,
7562,
4440,
1073,
300,
2918,
28563,
916,
31846,
6951,
30681,
14,
679,
22,
14,
1721,
14,
68853,
4440,
8838,
7561,
12,
6040,
9607,
977,
12
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
7280,
88524,
520,
24789,
301,
3142,
11896,
4999,
1277,
1129,
7562,
4440,
1073,
300,
2918,
28563,
916,
31846,
6951,
30681,
14,
679,
22,
14,
1721,
14,
28192,
48535,
648,
12,
7280,
6354,
625,
287,
5364,
38221,
3592,
220,
4728,
220,
4728,
9489,
33116,
1795,
1129,
7562,
4440,
1073,
300,
2918,
28563,
916,
31846,
6951,
30681,
14,
679,
22,
14,
2437,
14,
10392,
28563,
848,
869,
17,
3592,
9489,
33116,
679,
22,
12,
2589,
12,
2589,
220,
868,
25,
2148,
25,
10828,
17248,
12,
2589,
12,
2589,
220,
868,
25,
2148,
25,
972,
7280,
88524,
520,
24789,
301,
3142,
11896,
4999,
1277,
1129,
7562,
4440,
1073,
300,
2918,
28563,
916,
31846,
6951,
30681,
14,
679,
22,
14,
1721,
14,
68853,
4440,
8838,
7561,
12,
6040,
9607,
977,
12,
-100
] |
Truthdiggers of the Week: Anonymous
Our picks for this week's Truthdiggers are a little unusual in that we don't really know who they are — at least not specifically. But we do know them by their collective, if faceless, alias: Anonymous. And more important, we know them by the artful and provocative acts of cyberpunkery they keep pulling off despite crackdowns and arrests.
Anonymous is composed of a team of skilled hackers who are clearly also quite publicity savvy, able to perform feats of culture-jamming both online and off without tipping into silly territory or taking cheap shots at symbols of authority just for the sake of a good prank. (All the same, their pranks tend to be good.)
But this week, the highly coveted Truthdigger honor goes to the members of this rogue network — the ranks of which were at least temporarily thinned earlier in the week by a coordinated Interpol sting — for their work in "exposing the global trade in intelligence," as The Guardian put it. More to the point, Anonymous teamed up with WikiLeaks to pass along some 5.5 million emails, news of which began hitting the wires last Sunday, lifted from the servers of the Texas-based private intelligence firm Stratfor. Here's more on that hack-and-leak operation.
WikiLeaks said the documents contained details of the inner workings of the private intelligence agency, links between government and private intelligence, and commentary on WikiLeaks itself.
"The material contains privileged information about the US government's attacks against Julian Assange and WikiLeaks and Stratfor's own attempts to subvert WikiLeaks," the whistleblower website said.
"There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States."
The email cache is said to contain information on measures taken to track activist and NGO activity for large companies, through media monitoring, and information on the financial sector.
The hacking attack on Stratfor is subject to an FBI investigation. Several alleged members of Anonymous have been arrested by authorities in the US and UK as part of investigations.
Although some disagree, such as The Christian Science Monitor's Dan Murphy, WikiLeaks' Julian Assange broke down the significance of the Stratfor project thusly.
WikiLeaks founder Julian Assange told Reuters: "Here we have a private intelligence firm, relying on informants from the U.S. government, foreign intelligence agencies with questionable reputations and journalists."
"What is of grave concern is that the targets of this scrutiny are, among others, activist organizations fighting for a just cause."
Good thing there's this group to act as a countervailing force. We'll look forward to further meddling by Anonymous in the international corporate arena in the future. Meanwhile, read and watch more about its other campaigns here, here and here.
#anonymous#hack#hacktivism#julian assange#occupy wall street#scientology#spying#stratfor#wikileaks
Arizona Secretary of State Confirms Election Fraud During Primary Vote
Emma Niles / Truthdig
2015 in Review: Truthdig's Books of the Year
VIDEO: News of Anonymous' Online Campaign Against the KKK Takes a Turn (Updated)
Befriending the Saudis Highlights U.S. Hypocrisy on Human Rights
Sonali Kolhatkar / Truthdig
Hacker, Hoaxer, Whistleblower, Spy
Peter Richardson / Truthdig
'Sabu' Tells Charlie Rose How He Went From Anonymous Hactivist to FBI Informant
Donald Kaufman / Truthdig | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 47 | [
128000,
25025,
67,
22099,
315,
279,
10563,
25,
31537,
198,
8140,
22657,
369,
420,
2046,
596,
30198,
67,
22099,
527,
264,
2697,
19018,
304,
430,
584,
1541,
956,
2216,
1440,
889,
814,
527,
2001,
520,
3325,
539,
11951,
13,
2030,
584,
656,
1440,
1124,
555,
872,
22498,
11,
422,
3663,
1752,
11,
15904,
25,
31537,
13,
1628,
810,
3062,
11,
584,
1440,
1124,
555,
279,
1989,
1285,
323,
66998,
14385,
315,
21516,
76609,
727,
814,
2567,
23062,
1022,
8994,
59233,
82,
323,
38811,
627,
33784,
374,
24306,
315,
264,
2128,
315,
26611,
41467,
889,
527,
9539,
1101,
5115,
43763,
64828,
11,
3025,
311,
2804,
64401,
315,
7829,
13636,
309,
5424,
2225,
2930,
323,
1022,
2085,
72293,
1139,
30571,
18455,
477,
4737,
12136,
15300,
520,
18210,
315,
11447,
1120
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
25025,
67,
22099,
315,
279,
10563,
25,
31537,
198,
8140,
22657,
369,
420,
2046,
596,
30198,
67,
22099,
527,
264,
2697,
19018,
304,
430,
584,
1541,
956,
2216,
1440,
889,
814,
527,
2001,
520,
3325,
539,
11951,
13,
2030,
584,
656,
1440,
1124,
555,
872,
22498,
11,
422,
3663,
1752,
11,
15904,
25,
31537,
13,
1628,
810,
3062,
11,
584,
1440,
1124,
555,
279,
1989,
1285,
323,
66998,
14385,
315,
21516,
76609,
727,
814,
2567,
23062,
1022,
8994,
59233,
82,
323,
38811,
627,
33784,
374,
24306,
315,
264,
2128,
315,
26611,
41467,
889,
527,
9539,
1101,
5115,
43763,
64828,
11,
3025,
311,
2804,
64401,
315,
7829,
13636,
309,
5424,
2225,
2930,
323,
1022,
2085,
72293,
1139,
30571,
18455,
477,
4737,
12136,
15300,
520,
18210,
315,
11447,
1120,
-100
] |
Zephyrus Capital Aviation Holdings 2 Limited was set up on Thursday the 5th of July 2018. Their current partial address is Dublin 2 Ireland, and the company status is Strike Off Listed. The company's current directors have been the director of 262 other Irish companies between them; 67 of which are now closed. Zephyrus Capital Aviation Holdings 2 Limited has 1 shareholder. | {
"redpajama_set_name": "RedPajamaC4"
} | 2,358 | [
128000,
57,
97353,
20962,
18880,
50047,
54642,
220,
17,
19439,
574,
743,
709,
389,
7950,
279,
220,
20,
339,
315,
5887,
220,
679,
23,
13,
11205,
1510,
7276,
2686,
374,
33977,
220,
17,
14990,
11,
323,
279,
2883,
2704,
374,
36478,
4206,
69548,
13,
578,
2883,
596,
1510,
28454,
617,
1027,
279,
7690,
315,
220,
14274,
1023,
18088,
5220,
1990,
1124,
26,
220,
3080,
315,
902,
527,
1457,
8036,
13,
1901,
97353,
20962,
18880,
50047,
54642,
220,
17,
19439,
706,
220,
16,
63342,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
57,
97353,
20962,
18880,
50047,
54642,
220,
17,
19439,
574,
743,
709,
389,
7950,
279,
220,
20,
339,
315,
5887,
220,
679,
23,
13,
11205,
1510,
7276,
2686,
374,
33977,
220,
17,
14990,
11,
323,
279,
2883,
2704,
374,
36478,
4206,
69548,
13,
578,
2883,
596,
1510,
28454,
617,
1027,
279,
7690,
315,
220,
14274,
1023,
18088,
5220,
1990,
1124,
26,
220,
3080,
315,
902,
527,
1457,
8036,
13,
1901,
97353,
20962,
18880,
50047,
54642,
220,
17,
19439,
706,
220,
16,
63342,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Before we headed to the airport for our early morning flight on the next day, we tried the famous themed restaurant, Modern Toilet. It was just walking distance from our hotel, Via Hotel Ximen.
Modern Toilet Restaurant is a quirky themed restaurant that was originated in Taiwan.
How about you? Have you tried the restaurant? Share your experience. | {
"redpajama_set_name": "RedPajamaC4"
} | 8,297 | [
128000,
10438,
584,
19946,
311,
279,
17149,
369,
1057,
4216,
6693,
11213,
389,
279,
1828,
1938,
11,
584,
6818,
279,
11495,
49644,
10960,
11,
18766,
82994,
13,
1102,
574,
1120,
11689,
6138,
505,
1057,
9689,
11,
45899,
14894,
1630,
27236,
627,
49552,
82994,
26568,
374,
264,
68232,
49644,
10960,
430,
574,
44853,
304,
29389,
627,
4438,
922,
499,
30,
12522,
499,
6818,
279,
10960,
30,
12037,
701,
3217,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
10438,
584,
19946,
311,
279,
17149,
369,
1057,
4216,
6693,
11213,
389,
279,
1828,
1938,
11,
584,
6818,
279,
11495,
49644,
10960,
11,
18766,
82994,
13,
1102,
574,
1120,
11689,
6138,
505,
1057,
9689,
11,
45899,
14894,
1630,
27236,
627,
49552,
82994,
26568,
374,
264,
68232,
49644,
10960,
430,
574,
44853,
304,
29389,
627,
4438,
922,
499,
30,
12522,
499,
6818,
279,
10960,
30,
12037,
701,
3217,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
"Happiness." "Contentment." "Subjective well-being." Can we measure how happy people are and if so, what can we do with this information? In this podcast, Carol Graham, the Leo Pasvolsky Senior Fellow and author of The Pursuit of Happiness: An Economy of Well-Being, explains how happiness/well-being research works and why it matters for public policy in the U.S. and globally.
Those of us involved focus on two distinct dimensions: hedonic well-being, a daily experience component; and evaluative well-being, the way in which people think about their lives as a whole, including purpose or meaning. Jeremy Bentham focused on the former and proposed increasing the happiness and contentment of the greatest number of individuals possible in a society as the goal of public policy. Aristotle, meanwhile, thought of happiness as eudemonia, a concept that combined two Greek words: "eu" meaning abundance and "daimon" meaning the power controlling an individual's destiny. | {
"redpajama_set_name": "RedPajamaC4"
} | 8,556 | [
128000,
46639,
67391,
1210,
330,
2831,
479,
1210,
330,
13317,
535,
1664,
33851,
1210,
3053,
584,
6767,
1268,
6380,
1274,
527,
323,
422,
779,
11,
1148,
649,
584,
656,
449,
420,
2038,
30,
763,
420,
18181,
11,
10463,
26181,
11,
279,
37848,
24971,
85,
3145,
8050,
19903,
37946,
323,
3229,
315,
578,
71760,
3159,
315,
79244,
25,
1556,
38661,
315,
8489,
12,
34242,
11,
15100,
1268,
23871,
6458,
616,
33851,
3495,
4375,
323,
3249,
433,
13146,
369,
586,
4947,
304,
279,
549,
815,
13,
323,
31550,
627,
23025,
315,
603,
6532,
5357,
389,
1403,
12742,
15696,
25,
61316,
14338,
1664,
33851,
11,
264,
7446,
3217,
3777,
26,
323,
19886,
1413,
1664,
33851,
11,
279,
1648,
304,
902,
1274,
1781,
922,
872,
6439,
439,
264,
4459,
11,
2737,
7580
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
46639,
67391,
1210,
330,
2831,
479,
1210,
330,
13317,
535,
1664,
33851,
1210,
3053,
584,
6767,
1268,
6380,
1274,
527,
323,
422,
779,
11,
1148,
649,
584,
656,
449,
420,
2038,
30,
763,
420,
18181,
11,
10463,
26181,
11,
279,
37848,
24971,
85,
3145,
8050,
19903,
37946,
323,
3229,
315,
578,
71760,
3159,
315,
79244,
25,
1556,
38661,
315,
8489,
12,
34242,
11,
15100,
1268,
23871,
6458,
616,
33851,
3495,
4375,
323,
3249,
433,
13146,
369,
586,
4947,
304,
279,
549,
815,
13,
323,
31550,
627,
23025,
315,
603,
6532,
5357,
389,
1403,
12742,
15696,
25,
61316,
14338,
1664,
33851,
11,
264,
7446,
3217,
3777,
26,
323,
19886,
1413,
1664,
33851,
11,
279,
1648,
304,
902,
1274,
1781,
922,
872,
6439,
439,
264,
4459,
11,
2737,
7580,
-100
] |
Exclusive: Andrew Castle on the dominance of the 'big three' and which one will win Wimbledon
Andrew Castle insists the enduring dominance of Novak Djokovic, Roger Federer and Rafael Nadal at the top of men's tennis is not becoming repetitive, as he suggests true tennis fans are reveling in the sport's most golden of eras.
Djokovic, Federer, Nadal and Britain's Andy Murray have shared every Wimbledon title between them since 2003 and while the failure of the next generation to knock them off their perch has been a cause for concern for some, BBC Sport's lead commentator at The All England Club insists the appetite to see more battles among the biggest names in the game is still there among tennis fans.
Speaking exclusively to Tennis365 on the roof of the Media Centre at Wimbledon, Castle insisted the game should not apologise for the lack of worthy competitors to three champions who have 53 Grand Slam titles between them.
"I wouldn't say they are making the rest look silly, but they are putting themselves on a different level compared to everyone in the history of the game, there is no doubt about that at this stage," Castle told us.
"It is almost difficult for me to commentate on these guys at times because you run out of things to say. This is analysing perfection in many ways. These guys achieved levels of excellence many years ago, but now they are in their 30s and they are continuing to take their games and our sport to new levels. It is quite extraordinary. It's difficult to find the words sometimes, so you have to sit back and let the tennis speak for itself.
"Whatever is ahead for us, we can expect to see those three battling it out for the final this week. We have guys like Stefanos Tsitsipas, Alexander Zverev and Felix Auger-Aliassime coming through, but for now, we have these three incredible legends leading our sport and it is a privilege to watch them do what they do."
Castle admits the 2019 Wimbledon winner is certain to come from the game's celebrated living legends, but he admits predicting who will end up as the champion on Sunday is a tough task.
"Watching Federer's win over Matteo Berrettini in the fourth round on Monday was just incredible," he added. "That is well as I've seen him play in a long time. If he plays like that in the next three rounds, of course he is a contender for the title again, even at the age of 37.
"If Roger plays at his absolute best, he is very hard to beat on a grass court and if Rafa has the willpower and his fitness levels remain where they are, he is more than capable of winning here again.
"I'm just hoping that Nadal stays injury free and continues to produce his best because he has been in sparkling form in this tournament so far.
"If I was pushed to come up with a winner, I still feel Novak has the beating of those two guys due to his style of play and it often feels he is so close to perfection, but this is still a very close contest.
"His match against Rafael Nadal in the semi-finals last year was one of the best matches of the whole season and it proved to be crucial because from there, Novak went on a run that saw him also win the US Open and Australian Open while reclaiming the world No.1 position.
"That match on Centre Court last year was effectively a Wimbledon final, as we knew the victory would beat Kevin Anderson in the final, so the level of intensity and quality of play in that match was just spectacular.
"Whichever one of the three wins again on Sunday, it will be a fantastic story and I know that in years to come, we will all look back on this period and appreciate how lucky we were to be watching this great sport at a time when these great champions were raising standards to such incredible levels."
Wimbledon will be across BBC TV, radio, and online through to the Men's final on Sunday.
Novak Djokovic Rafael Nadal Roger Federer
Madison Keys latest player to miss Australian Open charter flight after testing positive for coronavirus
Madison Keys unlikely to play at Australian Open.
Andy Murray in race against time to play at Australian Open after testing positive for COVID-19
Andy Murray tests positive for coronavirus – report.
Andy Murray Australian Open appearance in doubt after positive test for Covid
Murray is hoping to be able to arrive in Australia at a later date. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 1,833 | [
128000,
71505,
25,
13929,
27987,
389,
279,
44592,
315,
279,
364,
16548,
2380,
6,
323,
902,
832,
690,
3243,
91257,
198,
41598,
27987,
43446,
279,
52876,
44592,
315,
4723,
587,
52162,
564,
41145,
11,
29607,
21780,
261,
323,
55500,
35762,
278,
520,
279,
1948,
315,
3026,
596,
32515,
374,
539,
10671,
59177,
11,
439,
568,
13533,
837,
32515,
7359,
527,
22899,
287,
304,
279,
10775,
596,
1455,
21411,
315,
2781,
300,
627,
35,
73,
564,
41145,
11,
21780,
261,
11,
35762,
278,
323,
13527,
596,
25871,
28253,
617,
6222,
1475,
91257,
2316,
1990,
1124,
2533,
220,
1049,
18,
323,
1418,
279,
8060,
315,
279,
1828,
9659,
311,
14459,
1124,
1022,
872,
42983,
706,
1027,
264,
5353,
369,
4747,
369,
1063,
11,
18588,
18707,
596,
3063,
69836,
520,
578
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
71505,
25,
13929,
27987,
389,
279,
44592,
315,
279,
364,
16548,
2380,
6,
323,
902,
832,
690,
3243,
91257,
198,
41598,
27987,
43446,
279,
52876,
44592,
315,
4723,
587,
52162,
564,
41145,
11,
29607,
21780,
261,
323,
55500,
35762,
278,
520,
279,
1948,
315,
3026,
596,
32515,
374,
539,
10671,
59177,
11,
439,
568,
13533,
837,
32515,
7359,
527,
22899,
287,
304,
279,
10775,
596,
1455,
21411,
315,
2781,
300,
627,
35,
73,
564,
41145,
11,
21780,
261,
11,
35762,
278,
323,
13527,
596,
25871,
28253,
617,
6222,
1475,
91257,
2316,
1990,
1124,
2533,
220,
1049,
18,
323,
1418,
279,
8060,
315,
279,
1828,
9659,
311,
14459,
1124,
1022,
872,
42983,
706,
1027,
264,
5353,
369,
4747,
369,
1063,
11,
18588,
18707,
596,
3063,
69836,
520,
578,
-100
] |
The Secret History of Las Vegas is a 2014 crime novel written by Nigerian-American writer Chris Abani. and published by Penguin Books on 7 January 2014 which later went on to win the Edgar Award for Best Paperback Original in 2015.
References
Edgar Award-winning works
2014 American novels
American mystery novels
Penguin Books books | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 1,803 | [
128000,
791,
8769,
11346,
315,
16132,
18059,
374,
264,
220,
679,
19,
9977,
11775,
5439,
555,
55433,
24145,
7061,
11517,
3765,
5676,
13,
323,
4756,
555,
71244,
18312,
389,
220,
22,
6186,
220,
679,
19,
902,
3010,
4024,
389,
311,
3243,
279,
60091,
17768,
369,
7252,
70232,
17674,
304,
220,
679,
20,
382,
32812,
4815,
2782,
12440,
17768,
27875,
4375,
198,
679,
19,
3778,
32963,
198,
29518,
23347,
32963,
198,
47,
46972,
18312,
6603,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
791,
8769,
11346,
315,
16132,
18059,
374,
264,
220,
679,
19,
9977,
11775,
5439,
555,
55433,
24145,
7061,
11517,
3765,
5676,
13,
323,
4756,
555,
71244,
18312,
389,
220,
22,
6186,
220,
679,
19,
902,
3010,
4024,
389,
311,
3243,
279,
60091,
17768,
369,
7252,
70232,
17674,
304,
220,
679,
20,
382,
32812,
4815,
2782,
12440,
17768,
27875,
4375,
198,
679,
19,
3778,
32963,
198,
29518,
23347,
32963,
198,
47,
46972,
18312,
6603,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Request to the server "ffsg.org"
ffsg.org. 10800 IN MX 50 mx3.sinequanon.info.
ffsg.org. 10800 IN MX 10 office.ffsg.org.
ffsg.org. 10800 IN TXT "v=spf1 mx:office.ffsg.org ip4:90.80.7.105 ip4:46.105.0.205 ~all"
ffsg.org. 10800 IN NS a.dns.gandi.net.
ffsg.org. 10800 IN NS b.dns.gandi.net.
ffsg.org. 10800 IN NS c.dns.gandi.net.
description: GANDI is one of the largest domain name registrars in Europe, and is ICANN accredited for the domain registration of COM, NET, ORG, BIZ, INFO, NAME, BE, FR, EU., UK, CH, LI, TV, CC, NU, US, MOBI, ASIA, DE, IT, AT, CN, NL., RU, ES, SE, JP, PT, AERO, AM, FM, TEL, PRO...Transfer your domain name to Gandi.net and benefit from a free blog, a free SSL certificate, a 2 pages website, 5 free e-mail addresses, and the full management of your domain name. Gandi VPS Hosting offers a dedicated virtual dedicated solution based on the Xen technology, both flexible and with no long term commitment.
/support/contact/ Contactez notre service clients. | {
"redpajama_set_name": "RedPajamaC4"
} | 7,262 | [
128000,
1939,
311,
279,
3622,
330,
544,
2034,
2726,
702,
544,
2034,
2726,
13,
220,
6640,
410,
2006,
28685,
220,
1135,
14961,
18,
516,
483,
447,
60010,
5506,
627,
544,
2034,
2726,
13,
220,
6640,
410,
2006,
28685,
220,
605,
5274,
84985,
2034,
2726,
627,
544,
2034,
2726,
13,
220,
6640,
410,
2006,
73529,
330,
85,
28,
2203,
69,
16,
14961,
25,
27614,
84985,
2034,
2726,
6125,
19,
25,
1954,
13,
1490,
13,
22,
13,
6550,
6125,
19,
25,
2790,
13,
6550,
13,
15,
13,
10866,
4056,
543,
702,
544,
2034,
2726,
13,
220,
6640,
410,
2006,
3119,
264,
962,
4511,
1326,
65674,
5181,
627,
544,
2034,
2726,
13,
220,
6640,
410,
2006,
3119,
293,
962,
4511,
1326,
65674,
5181,
627,
544,
2034,
2726,
13,
220,
6640,
410
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
1939,
311,
279,
3622,
330,
544,
2034,
2726,
702,
544,
2034,
2726,
13,
220,
6640,
410,
2006,
28685,
220,
1135,
14961,
18,
516,
483,
447,
60010,
5506,
627,
544,
2034,
2726,
13,
220,
6640,
410,
2006,
28685,
220,
605,
5274,
84985,
2034,
2726,
627,
544,
2034,
2726,
13,
220,
6640,
410,
2006,
73529,
330,
85,
28,
2203,
69,
16,
14961,
25,
27614,
84985,
2034,
2726,
6125,
19,
25,
1954,
13,
1490,
13,
22,
13,
6550,
6125,
19,
25,
2790,
13,
6550,
13,
15,
13,
10866,
4056,
543,
702,
544,
2034,
2726,
13,
220,
6640,
410,
2006,
3119,
264,
962,
4511,
1326,
65674,
5181,
627,
544,
2034,
2726,
13,
220,
6640,
410,
2006,
3119,
293,
962,
4511,
1326,
65674,
5181,
627,
544,
2034,
2726,
13,
220,
6640,
410,
-100
] |
Just 35 minutes from the Melbourne CBD, Thornhill Park provides you with everything you need to create a moden and fulfilling living experience.
This progressive new suburb sets the benchmark for desirable living in Melbourne's West and will open your eyes to a new way of life.
Designed to deliver everything you need from a welcoming community to a natural environment, Thornhill Park caters to all, bringin you convenience and quality contemporary living. | {
"redpajama_set_name": "RedPajamaC4"
} | 2,184 | [
128000,
10156,
220,
1758,
4520,
505,
279,
27535,
22834,
11,
78024,
28607,
5657,
5825,
499,
449,
4395,
499,
1205,
311,
1893,
264,
100247,
323,
50698,
5496,
3217,
627,
2028,
23053,
502,
52265,
7437,
279,
29531,
369,
35946,
5496,
304,
27535,
596,
4410,
323,
690,
1825,
701,
6548,
311,
264,
502,
1648,
315,
2324,
627,
78233,
311,
6493,
4395,
499,
1205,
505,
264,
36387,
4029,
311,
264,
5933,
4676,
11,
78024,
28607,
5657,
8415,
388,
311,
682,
11,
4546,
258,
499,
19679,
323,
4367,
19225,
5496,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
10156,
220,
1758,
4520,
505,
279,
27535,
22834,
11,
78024,
28607,
5657,
5825,
499,
449,
4395,
499,
1205,
311,
1893,
264,
100247,
323,
50698,
5496,
3217,
627,
2028,
23053,
502,
52265,
7437,
279,
29531,
369,
35946,
5496,
304,
27535,
596,
4410,
323,
690,
1825,
701,
6548,
311,
264,
502,
1648,
315,
2324,
627,
78233,
311,
6493,
4395,
499,
1205,
505,
264,
36387,
4029,
311,
264,
5933,
4676,
11,
78024,
28607,
5657,
8415,
388,
311,
682,
11,
4546,
258,
499,
19679,
323,
4367,
19225,
5496,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
« Frank Gutch Jr: Generation Found; It Was a Long Walk Home (Thoughts Spurred By Separation From Viet Nam-Era Army); plus N-n-n-n-notes…
RoxanneTellier – Life's Been Good To Me So Far … »
Pat Blythe – The Chains That Bind plus Bits and Pieces
I'm going to sneak one in this week. I miss writing and Tuesday's column by fellow writer Frank Gutch Jr. has motivated me. "War stories" of a different type….addiction…"the fact or condition of being addicted to a particular substance or activity." (Oxford Dictionary) In this case, I'm referring specifically to "a particular substance".
I watched and listened to the first video and couldn't stop the tears streaming down my face. It touched a chord that I thought I, if not buried, had at least set aside. It became personal. Someone very near and dear to me, someone I love very much, suffers from addiction. A path not consciously chosen in the beginning but, once it became rather well-worn was impossible to deviate from. Even after the cries for help, clean periods and all the support in the world, nothing could save the drowning woman. So far down the gopher hole now the addiction is no longer recognized by the addicted. "I can quit anytime." She is a single representation of the many who suffer from this disease, a disease that not only becomes the monkey on your back but you become the monkey. EVERYTHING changes, including the person you once were. Your brain makes sure of that.
The ripple effect doesn't ever end, it just keeps spreading. When someone becomes addicted to drugs or alcohol, it becomes a way of life…..for everyone, including the non-addicted. A "new normal" although I'm beginning to wonder what "normal" is? Maybe everything is and there is no "new" normal. It's all just different. Just life. Just? Family and friends are affected, even if they don't realize it. Addiction touches, and to a degree damages, everyone around them. Much has been written about addiction from myriad points of view but we are unable to do the impossible, get inside the mind of an addict. Yes, there is the physical, but it's the mental, the mind, that really controls it. All those lovely little receptors floating around looking for a good time. We can't splice open a brain like we can the rest of the body, discover the "bad part" and cut it out. Nope. It's wearing the invisibility cloak. It's the worst game of hide-and-seek ever and we are permanently "it", ceaselessly trying to discover it's hiding place.
According to Science News, "A lot of people think addiction is what happens when someone finds a drug to be the most rewarding thing they've ever experienced," says neuroscientist George Koob, director of the National Institute on Alcohol Abuse and Alcoholism in Bethesda, Md. "But drug abuse is not just feeling good about drugs. Your brain is changed when you misuse drugs. It is changed in ways that perpetuate the problem." The changes associated with drug use affect how addicts respond to drug cues, like the smell of a cigarette or the sight of a shot of vodka. Drug abuse also changes how other rewards, such as money or food are processed, decreasing their relative value." To read the entre article click here.
What we really need to discover is the raison d'être for starting down that road. Loneliness? Lack of self esteem? Depression? A death? Puberty? What kick-started it in the first place? I don't have the answer(s), only questions and whole lot of pain for that beautiful woman who has been a part of my life for almost 30 years….who came this close……..
Thank you Frank. To read Frank's column about this special school in Texas. go here https://bobsegarini.wordpress.com/2017/03/28/frank-gutch-jr-generation-found-it-was-a-long-walk-home-thoughts-spurred-by-separation-from-viet-nam-era-army-plus-n-n-n-n-notes/ What a stellar idea!! At the risk of repetition……a beautiful song.
Just One – Matt Butler
Apparently March is theatre month. I've already written about Sousatzka. The next theatre experience was on March 17, the musical Mrs. Henderson Presents at the stunningly gorgeous Royal Alexandra Theatre in Toronto. It's absolutely exquisite….the theatre I mean. First time I've been inside. The evening event was courtesy of my eldest son Aarron and girlfriend Kirsten, their Christmas gift to me. My date for the evening was Marion MacLeod. A Scot from Isle of Lewis whom I met during my early telecom start, Marion and I have become fast friends over the years. She will be turning 80 this year and is a joy to hang out with. I found out a few years back that my nana was Marion's Sunday school teacher at the Free Church of Scotland here in Toronto. (My mom's side of the family are Scottish, Highlanders from the Inverness area). Marion and I started with dinner at N'awlins (yum) and a good yammer, then headed a block down King St. to catch the show. Judy Dench, Bob Hoskins and Christopher Guest starred in the movie so I was delighted to catch the live performance. It was a wonderful show and both Marion and I thoroughly enjoyed it….naughty bits and all.
Mrs. Henderson Presents (official movie trailer)
The third play this month was The Triumph of Teresa Harris, written by my cousin Penn Kemp. Kemp is a playwright, novelist, performance artist and sound poet and the daughter of well-known artist, the late James Alexander Kemp (forever known to me as Uncle Jim). She received her Masters of Education at U of T, was writer in residence for Niagara Erie Writers in New York State, Labrador School Board, Flesherton Library and SNDT Women's University, Mumbai. Kemp has produced numerous bodies of work, traveled the world and became London, Ontario's first poet laureate in 2010.
So it was only fitting that Penn Kemp write the story about Teresa Harris whose family moved to London when her father, Royal Navy Captain John Harris was appointed treasurer of the London District. Teresa was born in 1839 and raised in Eldon House, a home built by her father. It is the oldest and most historic house in London, owned and occupied by the family for 125 years. The family donated the home as a museum to the City of London in 1960 with the rest of the property becoming Harris Park.
Harris was a delicate child with an indomitable spirit who grew into a very robust, healthy woman living a very non-conventional life during the Victorian era (sans corsets). Both her husband's toured the world and she traveled right along with them. After her first husband John Scott died of typhoid on board a ship heading home from India, she married St. George Littledale, a man 12 years her junior (she was 35, he was 23). Littledale was a both an explorer and big game hunter and together he and Teresa traveled the world, journeying to places rarely seen by women including the Middle East, Tibet, Asia as well as Russia, Europe and North America. The Triumph of Teresa Harris, performed at the Palace Theatre, was sold out all three nights.
The yearly Rock The Park Music Festival is a huge four-day concert event held every year in Harris Park, a stone's throw from Eldon House. Teresa would have loved it!
…and Now the Music….
The rest of March was spent catching the Taylor boys….Sam Taylor and The East End Love at Scruffy Murphy's one night, The Linsmore the next night (March 18 & 19) and the Julian Taylor Band at Aoelian Hall in London the following weekend (March 25). The packed house at the Linsmore show was also celebrating a rather auspicious occasion, the birthday of one Shawn O'Shea….born on St. Patrick's Day, 65 years ago. Spouse of fellow scribe Roxanne Tellier, legends and legions of the music biz folk crammed the pub to wish O'Shea happy returns, eat cake and dance to the new blues by Taylor and his band. Bob Segarini joined Taylor at the end of the night, serenading us with "Stormy Monday".
L-R – Connor Maslen-Walsh, Jace Traz, Sam Taylor, Maia Van Raes
Roxanne and birthday boy Shawn
L-R – Connor Maslen-Walsh, Bob Segarini, Sam Taylor, Jace Traz behind Maia Van Raes
The following weekend I took my 87-year-old mother to her first ever rock concert and she loved it! The Julian Taylor Band performed for one night only and the place was rocking, the dance floor full and music just filled up the entire hall. The band was truly on fire, sounding so tight and "in the pocket" (as one says) the show was seamless, high energy….and they brought the sax players!!!! You couldn't stop moving, sitting or standing. A standing O and encores later….Taylor and the band had the audience in the palm of their respective hands. London will definitely be having these boys back.
L-R – Jeremy Elliott, Gareth Parry, Julian Taylor, Yoser Rodrigues
Julian Taylor (Yoser Rodrigues in background)
Set Me Free – Julian Taylor Band
Opening act for JTB was Pacanomad — Chantel Rivard (vox), Dave Ball (bass), Zack Stewart (drums) and Nick Cifaldi (guitar) — a young, London-based Indie rock/alt band with a rather eclectic mix of music. Together since 2012, the band released their first EP in 2014 with a new one set for release in 2017. Rivard's voice reminded me of Postmodern Jukebox with a Lennon sisters 40's twist with the perfect trill.
L-R – Nick Cifaldi, Zack Stewart, Dave Ball, Chantel Rivard
DreamChaser – Pacanomad
Coming Out – Pacanomad
…..and kudos to Aoelian Hall and all the volunteers. What an absolutely great stage to perform on, excellent seating everywhere (loved the tables at the front for this show) and fantastic sound. The hall offers two rooms right off the main concert hall for merchandise (left) as well as a separate area (right) with a fully stocked bar, yummy snacks, tea and coffee. There also have an elevator as the main concert area is on the second floor.
Friday evening, March 24, I headed to the popular London music hub FitzRays to meet up with Tara Scott and see Def Bombs. Scott and FitzRays are up for a couple of Jack Richardson Awards for Best Live Venue and Contributor. I wish them both luck. Scott got tied up but I hung out for one set of Def Bombs. Hard core rock 'n' roll cover band comprised of experienced solid musicians — John Patterson (vox), Chris 'Shlep' Caron (bass), Rob MacEachern (drums) and Jeff Kikut (guitars) — performing Led Zepplin, Black Sabbath, Alice in Chains, etc. who had the crowded bar rocking and the dance floor full of happy feet.
John Patterson of Def Bombs
Some Great Events Coming Up….
March 29, Lula Lounge – Folk Music Ontario's ICEBREAKER with Julian Taylor, AHI, Coco Love Alcorn
March 30, Placebo Place – The Alzeimers Appreciation Orchestra with Peter Kashur, Bob Segarini, Roxanne Tellier and guests
April 1, Olde Stone Cottage – Sam Taylor and The East End Love
April 8, Toronto Centre for The Arts – Father & Son Dueling Pianos, – Eddie and Quincy Bullen
April 9, Olde Stone Cottage – David Gogo with guest Sam Taylor
April 18-22, Sheraton Centre and all over Toronto – Canadian Music Week (CMW)
April 19, Adelaide Hall – James Blonde, Ivory Hours, The Balconies
April 22, Horseshoe Tavern – Julian Taylor Band
April 28, Showplace Performance Centre, Peterborough – ONES
Yes, I am still getting out at night…..but that's all for now!
….and this….slightly reminiscent of Marianne Faithful.
Infamous – Basia Bulat
Fool – Basia Bulat
Tall Tall Shadow – Basia Bulat
=PB=
Pat's column appears every Wednesday.
Contact us at: [email protected]
"Music and photography….my heart, my passions." After an extended absence — 33 years as a consultant and design specialist in the telecommunications industry — Pat has turned her focus back to the music scene. Immersing herself in the local club circuit, attending the many diverse music festivals, listening to some great music, photographing and writing once again, she is eager to spread the word about this great Music City of ours…..Toronto. Together for 34 years, Pat also worked alongside her late husband Christopher Blythe, The PictureTaker©, who, beginning in the early 70s, photographed much of the local talent (think Goddo, Frank Soda and the Imps, BB Gabor, the first Police Picnic, Buzzsaw, Hellfield, Shooter, The Segarini Band….) as well as national and international acts. Pat is currently making her way through 40 years of Chris's archives, 20 of which are a photographic history of the local GTA music scene beginning in 1974. It continues to be a work in progress. Oh…..and she LOVES to dance!
This entry was posted on March 29, 2017 at 5:53 pm and is filed under Opinion, Review with tags A Girl With A Camera "The Picture Taker", Addiction, Aeolian Hall, Bob Hoskins, Bob Segarini, Christopher Guest, DBAWIS, Def Bombs, Don't Believe a Word I Say, Eldon House, Fitzrays, Flesherton Library, Frank Gutch Jr., Harris Park, Jack Richardson Awards, JTB, Judy Dench, Julian Taylor, Julian Taylor Band, Labrador School Board, Linsmore, London Ontario, Matt Butler, Mrs Henderson Presents, Nawlins, Niagara Erie Writers, Oxford Dictionary, Pacanomad, Palace Theatre, Pat Blythe, Penn Kemp, Rock The Park, Roxanne Tellier, Sam Taylor, Sam Taylor and the East End Love, Science News, Scruffy Murphy's, Shawn O'Shea, SNDT Women's University Mumbai, St George Littledale, Tara Scott, Teresa Harris, The Triumph of Teresa Harris. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 1,737 | [
128000,
24633,
9454,
480,
14390,
16014,
25,
24367,
12595,
26,
1102,
15148,
264,
5843,
12839,
5492,
320,
85269,
82,
3165,
8293,
3296,
34199,
367,
5659,
18203,
31074,
13737,
969,
13309,
1237,
5636,
452,
5392,
5392,
5392,
62967,
90578,
49,
5241,
20991,
41551,
1291,
1389,
9601,
596,
51678,
7839,
2057,
2206,
2100,
13759,
4696,
125341,
28205,
426,
398,
1820,
1389,
578,
82869,
3011,
30289,
5636,
50557,
323,
68640,
198,
40,
2846,
2133,
311,
45264,
832,
304,
420,
2046,
13,
358,
3194,
4477,
323,
7742,
596,
3330,
555,
12637,
7061,
9454,
480,
14390,
16014,
13,
706,
27762,
757,
13,
330,
29784,
7493,
1,
315,
264,
2204,
955,
21060,
723,
2538,
56209,
1820,
2144,
477,
3044,
315,
1694,
57727,
311,
264,
4040,
20278,
477,
5820,
1210,
320,
46,
23382,
10685,
8
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
24633,
9454,
480,
14390,
16014,
25,
24367,
12595,
26,
1102,
15148,
264,
5843,
12839,
5492,
320,
85269,
82,
3165,
8293,
3296,
34199,
367,
5659,
18203,
31074,
13737,
969,
13309,
1237,
5636,
452,
5392,
5392,
5392,
62967,
90578,
49,
5241,
20991,
41551,
1291,
1389,
9601,
596,
51678,
7839,
2057,
2206,
2100,
13759,
4696,
125341,
28205,
426,
398,
1820,
1389,
578,
82869,
3011,
30289,
5636,
50557,
323,
68640,
198,
40,
2846,
2133,
311,
45264,
832,
304,
420,
2046,
13,
358,
3194,
4477,
323,
7742,
596,
3330,
555,
12637,
7061,
9454,
480,
14390,
16014,
13,
706,
27762,
757,
13,
330,
29784,
7493,
1,
315,
264,
2204,
955,
21060,
723,
2538,
56209,
1820,
2144,
477,
3044,
315,
1694,
57727,
311,
264,
4040,
20278,
477,
5820,
1210,
320,
46,
23382,
10685,
8,
-100
] |
One of the things about Lent is its length. You have a 40 day period not counting Sundays. That's a pretty long haul over a 10th of a year and it generally takes place during the end of the winter season when you are anxious to get out of a time of cold and darkness.
As you get to the 2nd half, you have the baseball season beginning, you have spring and you have the warm weather. It begins to be a downhill trip rather than an uphill one.
The trick is to reach that point.
Faith is often like that, consider the parable of the sower and the seed, you have the seed that can't get started on the path, the seed who barely gets started on the rocky ground and the seed that gets choked by the weeds.
As we progress the enemy will put obstacles in our way to try to throw us off the path, to make us tire of it because if we reach the top of the hill we might have the confidence to go on to the end.
The trick to keep moving forward and with the help of Christ it's something we can do. In fact some years like this year with a late Easter we might even get an early glimpse of the finish line with spring and baseball already in play before we hit the half way point.
Let us resolve to keep walk with the Lord this Lent and not let the Devil's trick to derail our journey before we're half way there.
One of the things about Lent is its length. You have a 40 day period not counting Sundays. That's a pretty long haul over a 10th of a year and it generally takes place during the end of the winter season when you are anxious to get out of a time of cold and darkness.
As you get to the 2nd half, you have the baseball season beginning, you have spring and you have the warm weather. It begins to be a downhill trip rather than an uphill one.
Faith is often like that, consider the parable of the sower and the seed, you have the seed that can't get started on the path, the seed who barely gets started on the rocky ground and the seed that gets choked by the weeds.
As we progress the enemy will put obstacles in our way to try to throw us off the path, to make us tire of it because if we reach the top of the hill we might have the confidence to go on to the end.
The trick to keep moving forward and with the help of Christ it's something we can do. In fact some years like this year with a late Easter we might even get an early glimpse of the finish line with spring and baseball already in play before we hit the half way point.
Let us resolve to keep walk with the Lord this Lent and not let the Devil's trick to derail our journey before we're half way there. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,763 | [
128000,
4054,
315,
279,
2574,
922,
84470,
374,
1202,
3160,
13,
1472,
617,
264,
220,
1272,
1938,
4261,
539,
1797,
46431,
8219,
5879,
14097,
13,
3011,
596,
264,
5128,
1317,
38968,
927,
264,
220,
605,
339,
315,
264,
1060,
323,
433,
4173,
5879,
261,
5879,
750,
5097,
2035,
10878,
46431,
279,
842,
315,
279,
3243,
5879,
466,
9581,
5879,
942,
994,
499,
527,
74884,
5879,
1245,
311,
636,
704,
315,
264,
892,
315,
9439,
323,
27394,
627,
2170,
499,
636,
311,
279,
220,
17,
303,
4376,
11,
499,
617,
279,
2385,
5879,
4047,
9581,
5879,
942,
3240,
5879,
1251,
11,
499,
617,
10683,
323,
499,
617,
279,
8369,
9282,
13,
1102,
12302,
311,
387,
264,
1523,
5879,
28607,
8577,
4856,
1109,
459,
77758,
832,
627,
791,
14397,
374
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
4054,
315,
279,
2574,
922,
84470,
374,
1202,
3160,
13,
1472,
617,
264,
220,
1272,
1938,
4261,
539,
1797,
46431,
8219,
5879,
14097,
13,
3011,
596,
264,
5128,
1317,
38968,
927,
264,
220,
605,
339,
315,
264,
1060,
323,
433,
4173,
5879,
261,
5879,
750,
5097,
2035,
10878,
46431,
279,
842,
315,
279,
3243,
5879,
466,
9581,
5879,
942,
994,
499,
527,
74884,
5879,
1245,
311,
636,
704,
315,
264,
892,
315,
9439,
323,
27394,
627,
2170,
499,
636,
311,
279,
220,
17,
303,
4376,
11,
499,
617,
279,
2385,
5879,
4047,
9581,
5879,
942,
3240,
5879,
1251,
11,
499,
617,
10683,
323,
499,
617,
279,
8369,
9282,
13,
1102,
12302,
311,
387,
264,
1523,
5879,
28607,
8577,
4856,
1109,
459,
77758,
832,
627,
791,
14397,
374,
-100
] |
Die Spider Murphy Gang ist ein deutscher Spielfilm aus dem Jahre 1983 rund um die gleichnamige Münchner Pop-/Rockband. Produziert wurde der Film von Michael Verhoeven.
Handlung
Die Spider Murphy Gang, das sind die vier Bayern Günther Sigl, Michael Busse, Franz Trojan und Barney Murphy, die als Bandmusiker durchstarten wollen. Sie haben keine Lust mehr, in Clubs, in denen hauptsächlich Amerikaner verkehren, irgendwelche x-beliebigen US-Poptitel zu covern. Vielmehr wollen sie ihre eigene Musik machen: bayerische Mundarttexte in Popgewand, eine Art bajuwarischen Rock 'n' Roll, den man aber auch nördlich des Weißwurstäquators zu goutieren versteht. Doch mit ihrer originellen Idee beißen die vier rasch auf Granit, keiner glaubt daran, dass man mit "Bavarian Rock", zumal in dialekteingefärbtem Deutsch, irgendeinen Raum füllen kann. Bald geht den Musikern das Geld aus, zumal Günther, der einzige unter ihnen, der bislang in Lohn und Brot stand, seinen Job als Bankkaufmann hingeschmissen hat. Um das Unglück perfekt zu machen, geht auch noch seine Freundin stiften.
Jetzt heißt es für die ebenso leidenschaftlichen wie begeisterungsfähigen Musiker: Alles auf eine Karte setzen. In einer heruntergekommenen Pinte in München-Haidhausen sollen sie ihre Chance bekommen – als Lückenbüßer für einen ausgefallenen Gig. Die vier Jungs kommen bei den Gästen an, und Kneipenwirt Joschko, ein ausgemachtes Schlitzohr, wittert seine Chance auf das große Geld. Erst muss er aber die neue Combo finanziell auf die Beine stellen, um mit ihnen eine Platte aufzunehmen. Die Scheibe wird jedoch ein totaler Ladenhüter, und die sich anbahnende Musikerkarriere bleibt gleich zu Beginn im Ansatz stecken. Doch die "Spiders" lassen sich nicht unterkriegen und mieten kurzerhand den Circus Krone an, wo bereits einst, im Juni 1966, die Beatles einen großen Erfolg erzielt hatten. Und tatsächlich wird dieser Auftritt ihr Durchbruch.
Produktionsnotizen
Die Spider Murphy Gang wurde überwiegend in München gedreht und am 6. Oktober 1983 uraufgeführt.
Regisseur Georg Kostya hatte sich einen Namen als Moderator einer Rocksendung im Bayerischen Rundfunk gemacht. Die Filmbauten entwarf Norbert Scherer.
Der von Senta Bergers und Michael Verhoevens Münchner Produktionsfirma Sentana hergestellte Film lief außerhalb Bayerns nahezu überall in Deutschland sehr schlecht. Lediglich das auf dem Soundtrack enthaltene Lied Mir san a bayerische Band wurde zu einem Publikumsliebling.
Kritiken
Weblinks
Einzelnachweise
Filmtitel 1983
Filmbiografie über Musikschaffende
Deutscher Film
Musikfilm
Spider Murphy Gang | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 6,883 | [
128000,
18674,
29490,
31053,
35517,
6127,
4466,
409,
6256,
9211,
20332,
491,
9672,
9608,
2486,
49115,
220,
3753,
18,
41997,
4543,
2815,
56348,
12682,
7404,
386,
16461,
86677,
10466,
67214,
36152,
7198,
13,
12311,
8510,
531,
27201,
2761,
17042,
6675,
8096,
6383,
77035,
1055,
382,
2367,
39049,
720,
18674,
29490,
31053,
35517,
11,
6754,
12868,
2815,
58193,
56691,
105705,
700,
42660,
75,
11,
8096,
19111,
325,
11,
66620,
96615,
2073,
94529,
31053,
11,
2815,
10942,
17366,
38827,
25840,
20350,
2527,
268,
58045,
13,
8663,
18096,
32457,
74355,
19028,
11,
304,
70132,
11,
304,
70607,
305,
2933,
13044,
32673,
6915,
126171,
261,
2807,
71717,
1466,
11,
88362,
90563,
1557,
865,
91305,
648,
65,
6569,
2326,
9483,
2985,
57743,
6529,
3504,
77,
13,
11655,
24037,
56088,
58045,
10112,
35849,
35834
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
18674,
29490,
31053,
35517,
6127,
4466,
409,
6256,
9211,
20332,
491,
9672,
9608,
2486,
49115,
220,
3753,
18,
41997,
4543,
2815,
56348,
12682,
7404,
386,
16461,
86677,
10466,
67214,
36152,
7198,
13,
12311,
8510,
531,
27201,
2761,
17042,
6675,
8096,
6383,
77035,
1055,
382,
2367,
39049,
720,
18674,
29490,
31053,
35517,
11,
6754,
12868,
2815,
58193,
56691,
105705,
700,
42660,
75,
11,
8096,
19111,
325,
11,
66620,
96615,
2073,
94529,
31053,
11,
2815,
10942,
17366,
38827,
25840,
20350,
2527,
268,
58045,
13,
8663,
18096,
32457,
74355,
19028,
11,
304,
70132,
11,
304,
70607,
305,
2933,
13044,
32673,
6915,
126171,
261,
2807,
71717,
1466,
11,
88362,
90563,
1557,
865,
91305,
648,
65,
6569,
2326,
9483,
2985,
57743,
6529,
3504,
77,
13,
11655,
24037,
56088,
58045,
10112,
35849,
35834,
-100
] |
82 --7 - I \t .... .. \ 'i. ., · .) 4 . historical biographies. Why? If he is using the F oxe-and I do beheve Shake- speare was familiar with Foxe, at least some of it-I don't think he is using it as a source. But even if I did accept the argument, this is still not the way Shakespeare works through a plot. Shakespeare usually takes whole phrases, sentences-not just key words here or there. You can see the way he'll trans- form things wholesale. Why would he have to hide the Foxe? Is it because Shakespeare was more closely aligned with Lutheran than with Calvinist the- ology? If Shakespeare had been inter- ested in Luther, he would have looked at a variety of sources. He was never sat- isfied with the first version that crossed his path." What worried Shapiro most about McGrail's approach was its emphasis on riddles and hints. He said that there has always been a tendency in Shakespeare studies for certain scholars to see what they wanted to see in a play, finding buried puns and anagrams to "prove," say, that Francis Bacon wrote the work. 'With enough inventiveness," Shapiro said, "almost anything can be argued about Shakespeare's plays-and most of it has been." Just this year, he noted, two highly respected scholars, Alvin Kernan and Eric Mallin, have published separate books arguing that the story of Hamlet parallels not the Luther story but, rather, that of James himself: the king-in-waiting. .... ., , . . "Don't get me wrong," Shapiro said. " 'Hamlet' comes at the height of Shake- speare's powers, and so that Reforma- tion context would have to be there. People are reading Foxe now, and it is a serious topic that has been overlooked for a long time." Even if McGrail's work is finally dis- missed in its particulars, it represents a renewed interest in the religious dimen- sions of Shakespeare. The New Crit- ics-the generation of Cleanth Brooks, Harry Levin, and Robert B. Heilman, who dominated the forties and fif- ties-emphasized language above all; the text as a self-contained unit, the well-wrought urn. The New Historicists and their British cousins, the Cultural Materialists, came of age in the sixties and seventies and now tend to dominate Shakespeare studies; their focus is on the mediating factor of history, and they are especially attuned to race, class, gender, and power relations. Members of that generation have been more secular in outlook and less focussed on religion. Scholars of McGrail's generation-the generation from twenty-five to forty- five-are adding religion to the histori- cal view of the plays. Shapiro said he hoped that both Mc- Grail and Sohmer would give up the hunt for the "holy grail" of a lost bio- graphical source and concentrate more on the way Shakespeare may have been taking a position on the religious con- troversies of Elizabethan England. Mc- THE NEW YORKER, NOVEMBER 20, 1995 Grail's theological hunches have the "strong ring of truth, but re- writing cultural history is a slow, laborious affair," Shapiro said. "There are no shortcuts, no huge discoveries. It's not about individuals like Luther, but about more complicated cultural shifts. " About Sohmer's work on the calendar, Shapiro was no less skeptical. If too much of Soh- mer's work depends on estab- lishing that the first perfor- mance of "Hamlet" was in 1601, then "it's like building ocean- front property in California: sooner or later the whole edifice will be washed away." As Sohmer himself acknowledges, there is still a great controversy over the dating of the play. Shapiro and I walked up 116th Street and across the Columbia campus to his office. As we passed the library, I told him about the conflict between Sohmer and McGrail. "An intellectual-property dispute over this is hilarious," he said. "In fact, it's sad." The norm in Shakespeare stud- ies, he added, is to circulate ideas, to dis- cuss things openly, to collaborate-and may the best scholarship prevail. "You know, it's funny, but Shake- speare was litigious himself," Shapiro said. "He was a killer businessman, who never cut anyone any slack on loans or business arrangements. This was an es- pecially litigious period of history, and Shakespeare was completely wrapped up in that. He moved from Stratford to London, but he was very careful about keeping up with his real-estate in- terests in the country. Even the crea- tion of the Globe Theatre involved a huge legal battle, which had workmen dismantling the theatre at night and dragging the pieces across the frozen Thames because the lease on the land had run out. Rather than let the land- lord reuse the timbers, they took them across the river and constructed the Globe. So this is not the first time the Shakespeare world has been recorded in the annals of law." I N the weeks that followed, I spoke with McGrail and Sohmer periodi- cally, both to talk about Shakespeare and to follow the course of their dispute. | {
"redpajama_set_name": "RedPajamaC4"
} | 8,532 | [
128000,
6086,
1198,
22,
482,
358,
1144,
83,
22666,
5354,
1144,
364,
72,
13,
119604,
9787,
662,
8,
220,
19,
662,
13970,
6160,
67245,
13,
8595,
30,
1442,
568,
374,
1701,
279,
435,
297,
8536,
9976,
358,
656,
387,
383,
588,
73423,
12,
2395,
548,
574,
11537,
449,
13585,
68,
11,
520,
3325,
1063,
315,
433,
22197,
1541,
956,
1781,
568,
374,
1701,
433,
439,
264,
2592,
13,
2030,
1524,
422,
358,
1550,
4287,
279,
5811,
11,
420,
374,
2103,
539,
279,
1648,
42482,
4375,
1555,
264,
7234,
13,
42482,
6118,
5097,
4459,
32847,
11,
23719,
30269,
1120,
1401,
4339,
1618,
477,
1070,
13,
1472,
649,
1518,
279,
1648,
568,
3358,
1380,
12,
1376,
2574,
35557,
13,
8595,
1053,
568,
617,
311,
10477,
279,
13585,
68,
30,
2209
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
6086,
1198,
22,
482,
358,
1144,
83,
22666,
5354,
1144,
364,
72,
13,
119604,
9787,
662,
8,
220,
19,
662,
13970,
6160,
67245,
13,
8595,
30,
1442,
568,
374,
1701,
279,
435,
297,
8536,
9976,
358,
656,
387,
383,
588,
73423,
12,
2395,
548,
574,
11537,
449,
13585,
68,
11,
520,
3325,
1063,
315,
433,
22197,
1541,
956,
1781,
568,
374,
1701,
433,
439,
264,
2592,
13,
2030,
1524,
422,
358,
1550,
4287,
279,
5811,
11,
420,
374,
2103,
539,
279,
1648,
42482,
4375,
1555,
264,
7234,
13,
42482,
6118,
5097,
4459,
32847,
11,
23719,
30269,
1120,
1401,
4339,
1618,
477,
1070,
13,
1472,
649,
1518,
279,
1648,
568,
3358,
1380,
12,
1376,
2574,
35557,
13,
8595,
1053,
568,
617,
311,
10477,
279,
13585,
68,
30,
2209,
-100
] |
Nulreglen siger, at et produkt er nul hvis og kun hvis en af faktorerne er nul.
Nulreglen kan benyttes til at visse 'te gradsligninger. Her ses et eksempel på hvordan nulreglen benyttes i praksis:
Løsningen bliver således:
Princippet er, at man først og fremmest faktoriserer ligningen, for derefter at undersøge, hvorvidt det der står uden for parentes, eller det der står inden for parentesen, giver nul. Altså, i dette tilfælde, to nye ligninger.
Et andet eksempel kunne være følgende tredjegradsligning:
Princippet er altså nøjagtigt det samme, selvom der blot er kommet flere parenteser på.
Se også
Algebraens fundamentalsætning
Abstrakt algebra
Algebra | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 1,247 | [
128000,
45,
360,
1610,
2963,
274,
7420,
11,
520,
1880,
73395,
2781,
308,
360,
78675,
7500,
24213,
78675,
665,
8136,
67892,
15171,
818,
2781,
308,
360,
382,
45,
360,
1610,
2963,
13728,
3399,
16820,
2392,
10478,
520,
2145,
325,
364,
668,
6117,
3306,
625,
5248,
13,
6385,
15907,
1880,
27955,
325,
1331,
301,
9292,
63259,
308,
360,
1610,
2963,
3399,
16820,
2392,
602,
550,
10011,
285,
1473,
43,
6282,
82,
73208,
1529,
1553,
21751,
839,
288,
25,
4815,
3617,
2910,
22309,
2781,
11,
520,
893,
47583,
267,
7500,
62222,
76,
478,
67892,
269,
12329,
261,
72700,
29018,
11,
369,
26344,
1064,
520,
26445,
6282,
713,
11,
51819,
1325,
83,
3474,
2761,
357,
18382,
93855,
369,
2748,
288,
11,
27028,
3474,
2761,
357,
18382,
1280,
268,
369,
2748,
67035
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
45,
360,
1610,
2963,
274,
7420,
11,
520,
1880,
73395,
2781,
308,
360,
78675,
7500,
24213,
78675,
665,
8136,
67892,
15171,
818,
2781,
308,
360,
382,
45,
360,
1610,
2963,
13728,
3399,
16820,
2392,
10478,
520,
2145,
325,
364,
668,
6117,
3306,
625,
5248,
13,
6385,
15907,
1880,
27955,
325,
1331,
301,
9292,
63259,
308,
360,
1610,
2963,
3399,
16820,
2392,
602,
550,
10011,
285,
1473,
43,
6282,
82,
73208,
1529,
1553,
21751,
839,
288,
25,
4815,
3617,
2910,
22309,
2781,
11,
520,
893,
47583,
267,
7500,
62222,
76,
478,
67892,
269,
12329,
261,
72700,
29018,
11,
369,
26344,
1064,
520,
26445,
6282,
713,
11,
51819,
1325,
83,
3474,
2761,
357,
18382,
93855,
369,
2748,
288,
11,
27028,
3474,
2761,
357,
18382,
1280,
268,
369,
2748,
67035,
-100
] |
La est une gare ferroviaire de la ville de Sennan, dans la préfecture d'Osaka au Japon. La gare est gérée par la JR West.
Situation ferroviaire
La gare d'Izumi-Sunagawa est située au point kilométrique (PK) 40,5 de la ligne Hanwa.
Histoire
La gare d'Izumi-Sunagawa est inaugurée le sous le nom de gare de Shindachi. Elle prend ensuite le nom de Hanwa-Sunagawa puis de Sunagawaen, avant de recevoir son nom actuel en 1944.
Service des voyageurs
Accès et accueil
La gare dispose d'un bâtiment voyageurs, avec guichet, ouvert tous les jours.
Desserte
Ligne Hanwa :
voies 1 et 2 : direction Hineno et Tennoji
voies 3 et 4 : direction Wakayama
Intermodalité
Dans les environs
Ruines du Kaie-ji
Notes et références
Notes
Références
Voir aussi
Articles connexes
Ligne Hanwa
Lien externe
La gare d'Izumi-Sunagawa sur le site de la JR West
Gare dans la préfecture d'Osaka
Gare JR West
Gare mise en service en 1930 | {
"redpajama_set_name": "RedPajamaWikipedia"
} | 2,232 | [
128000,
8921,
220,
1826,
6316,
342,
548,
18728,
299,
20708,
556,
409,
1208,
39973,
409,
328,
2734,
276,
11,
7010,
1208,
27389,
3836,
554,
294,
6,
29967,
13637,
8065,
123295,
13,
5034,
342,
548,
1826,
342,
14081,
8047,
1370,
1208,
53666,
4410,
382,
61935,
4090,
18728,
299,
20708,
556,
720,
8921,
342,
548,
294,
42069,
89,
25330,
6354,
359,
351,
14406,
1826,
10109,
8047,
8065,
1486,
15395,
316,
978,
376,
2428,
320,
23037,
8,
220,
1272,
11,
20,
409,
1208,
27912,
21296,
10196,
382,
39,
26407,
556,
720,
8921,
342,
548,
294,
42069,
89,
25330,
6354,
359,
351,
14406,
1826,
82100,
8047,
514,
220,
32592,
514,
9859,
409,
342,
548,
409,
1443,
485,
31464,
13,
46408,
35456,
76826,
514,
9859,
409,
21296,
10196,
6354,
359,
351,
14406,
44829
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
8921,
220,
1826,
6316,
342,
548,
18728,
299,
20708,
556,
409,
1208,
39973,
409,
328,
2734,
276,
11,
7010,
1208,
27389,
3836,
554,
294,
6,
29967,
13637,
8065,
123295,
13,
5034,
342,
548,
1826,
342,
14081,
8047,
1370,
1208,
53666,
4410,
382,
61935,
4090,
18728,
299,
20708,
556,
720,
8921,
342,
548,
294,
42069,
89,
25330,
6354,
359,
351,
14406,
1826,
10109,
8047,
8065,
1486,
15395,
316,
978,
376,
2428,
320,
23037,
8,
220,
1272,
11,
20,
409,
1208,
27912,
21296,
10196,
382,
39,
26407,
556,
720,
8921,
342,
548,
294,
42069,
89,
25330,
6354,
359,
351,
14406,
1826,
82100,
8047,
514,
220,
32592,
514,
9859,
409,
342,
548,
409,
1443,
485,
31464,
13,
46408,
35456,
76826,
514,
9859,
409,
21296,
10196,
6354,
359,
351,
14406,
44829,
-100
] |
Have a question about the 835955-B21 - 1x 16GB DDR4-2666 RDIMM PC4-21300V-R Dual Rank x8 Replacement?
Our technical support can help you with any question to ensure 835955-B21 is right for your system.
This 835955-B21 replacement is a proven memory product. It's either approved, certified or OEM qualified to ensure total reliability.
Nothing is perfect. Sometimes things happen. If your 835955-B21 replacement upgrade fails at anytime–we will ship a replacement same day. We support your 835955-B21 memory purchase long after the sale.
Get ➔ Lifetime warranty ✓ Great savings ✓ Buy factory original 835955-B21 compatible replacement memory modules configured to your HPE Synergy or HPE ProLiant system.
Guaranteed by federal law – This 835955-B21, HP 16GB (1x 16GB) Dual Rank x8 PC4-21300V-R (DDR4-2666) Registered Memory Kit equivalent made by Samsung, SK Hynix or Micron does not affect or void HP warranties. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,410 | [
128000,
12389,
264,
3488,
922,
279,
220,
23424,
25875,
7826,
1691,
482,
220,
16,
87,
220,
845,
5494,
44860,
19,
12,
15999,
21,
39092,
1829,
44,
6812,
19,
12,
11702,
410,
53,
11151,
34759,
19856,
865,
23,
47312,
5380,
8140,
11156,
1862,
649,
1520,
499,
449,
904,
3488,
311,
6106,
220,
23424,
25875,
7826,
1691,
374,
1314,
369,
701,
1887,
627,
2028,
220,
23424,
25875,
7826,
1691,
14039,
374,
264,
17033,
5044,
2027,
13,
1102,
596,
3060,
12054,
11,
23759,
477,
41862,
15337,
311,
6106,
2860,
31638,
627,
24714,
374,
4832,
13,
18156,
2574,
3621,
13,
1442,
701,
220,
23424,
25875,
7826,
1691,
14039,
14234,
14865,
520,
30194,
4235,
906,
690,
8448,
264,
14039,
1890,
1938,
13,
1226,
1862,
701,
220,
23424,
25875,
7826,
1691,
5044,
7782,
1317
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
12389,
264,
3488,
922,
279,
220,
23424,
25875,
7826,
1691,
482,
220,
16,
87,
220,
845,
5494,
44860,
19,
12,
15999,
21,
39092,
1829,
44,
6812,
19,
12,
11702,
410,
53,
11151,
34759,
19856,
865,
23,
47312,
5380,
8140,
11156,
1862,
649,
1520,
499,
449,
904,
3488,
311,
6106,
220,
23424,
25875,
7826,
1691,
374,
1314,
369,
701,
1887,
627,
2028,
220,
23424,
25875,
7826,
1691,
14039,
374,
264,
17033,
5044,
2027,
13,
1102,
596,
3060,
12054,
11,
23759,
477,
41862,
15337,
311,
6106,
2860,
31638,
627,
24714,
374,
4832,
13,
18156,
2574,
3621,
13,
1442,
701,
220,
23424,
25875,
7826,
1691,
14039,
14234,
14865,
520,
30194,
4235,
906,
690,
8448,
264,
14039,
1890,
1938,
13,
1226,
1862,
701,
220,
23424,
25875,
7826,
1691,
5044,
7782,
1317,
-100
] |
Subscribe to Bits & Pieces
Company Type Insurance Trucking/Transportation/Logistics Legal Other
A monthly digest of recent news events in the motor carrier and insurance industries.
Volume 21, Edition 12
Volume 21, Edition 9
Volume 18 Edition 2
Cases (2019)
Volume 21 Cases (2018)
Volume 21, Edition 11, Cases
Volume 21, Edition 9, Cases
Volume 20, Edition 12. Cases
Volume 20, Edition 11 Cases
Volume 20, Edition 8. Cases
Volume 20, Edition 6 Cases
Volume 14. edition 3, cases
Volume 6, Edition 10
Volume 6, Edition 6
Penn v. 1st Southern Insurance Services, 2018 WL 3468366
Posted on July 30, 2018 Author Categories Volume 21, Edition 7, Cases
2018 WL 3468366
United States District Court, E.D. Virginia,
Richmond Division.
Denise A. PENN, et al., Plaintiffs,
1ST SOUTHERN INSURANCE SERVICES, INC., et al., Defendants.
Civil Action No. 3:17-cv-758
Signed 07/18/2018
Attorneys and Law Firms
John Janney Rasmussen, Insurance Recovery Law Group PLC, Elliott Matthew Buckner, Michael Scott Bucci, Cantor Stoneburner Ford Grana & Buckner, Richmond, VA, for Plaintiffs.
Julie Smith Palmer, Robert Forest Friedman, Harman Claytor Corrigan & Wellman, Richmond, VA, for Defendants.
MEMORANDUM OPINION
Robert E. Payne, Senior United States District Judge
*1 This matter is before the Court on DEFENDANTS' RULE 12(b) (6) MOTION TO DISMISS (ECF No. 7). For the following reasons, the motion will be granted.
Plaintiffs Denise Penn and Houstonia Clymer filed this action against Defendants, 1st Southern Insurance Services, Inc., George Roberts, and Fran Pless, for their failure to procure proper insurance coverage for Jimmy Barker and Barker & Son Forestry Services, Inc. Defendants have moved for dismissal of the Complaint (ECF No. 1) pursuant to Fed. R. Civ. P. 12(b)(6).
I. Factual Context (As Set Forth in the Complaint)
The following factual overview is based on the allegations in the Complaint.
This case arises out of an insurance policy selected and placed by Defendants on behalf of Jimmy Barker and Barker & Son Forestry Services, Inc. (collectively "Barker"). Compl. *1-3.
Defendants contracted with Barker to advise as to the kinds and amount of insurance that Barker had to purchase under applicable law (i.e., for a trucking business operating in at least four states) and to select and place that insurance. Compl. *6-8. Barker had no special experience in insurance matters and therefore relied entirely on Defendants and their promised expertise for the selection and placement of insurance. Compl. *4. Barker's reliance arose, at least in part, from Defendants' claimed experience in insuring truckers. Compl. *4. Defendants were aware that Barker counted on them to secure all required insurance. Compl. *5.
Nevertheless, Defendants selected and placed a policy that did not meet mandatory minimum financial responsibility federal trucking standards. Compl. *5. That policy did not contain a MCS-90 endorsement, and it failed to satisfy coverage minimums. Compl. *5. As to the latter deficiency, the minimum financial responsibility protection required under federal law is $750,000 in liability coverage, but the policy provided only $100,000. Compl. *2.
Penn and Clymer were severely injured in an accident caused by Justin Colvard, while he was driving a truck for Barker. Compl. *2. That accident occurred while the policy at issue here was in effect. See Compl. *2-5. Thereafter, Penn and Clymer secured judgments against the Barker & Son business in the Circuit Court of Brunswick County, Virginia. Compl. *2. Penn was awarded damages in the amount of $2,450,000. Compl. *2. Clymer was awarded damages in the amount of $275,000. Compl. *2.
The insurer refused to pay the additional amount required to meet minimum insurance standards under federal law ($650,000). See Compl. *2-3. Barker, therefore, assigned all of its rights against Defendants to Penn and Clymer, who now sue Defendants for their failure to provide proper guidance and for failure to obtain proper coverage for Barker. Compl. *2-3.
II. Additional Factual Context
Defendants allege that the Complaint omits a substantial amount of relevant information. Defs.' Br. 2, 4-5. This information is discussed here, although whether it can be considered in resolving Defendants' motion shall be addressed below.
*2 Defendants observe that the policy at issue was "procured and issued in 2004 for a policy period that terminated in 2005." Defs.' Br. 2. Furthermore, they claim that the accident in which Penn and Clymer were injured occurred on August 2, 2005. Defs.' Br. 2, 4-5. And, they note that the policy at issue was previously considered by this Court in a declaratory judgment action in 2007 (to which Penn and Clymer were parties). See Defs.' Br. 5. In a ruling affirmed by the Fourth Circuit in 2009, this Court found that the policy provided only $100, 000 in liability coverage. See Defs.' Br. 2, 5. To support those factual claims, Defendants attach as exhibits: (1) the declarations pages of the policy at issue; (2) the complaint in the declaratory judgment action (which itself includes a copy of the policy); (3) the answers filed by Penn and Clymer in that action; (4) the district court's final order in that action; and (5) the Fourth Circuit's opinion affirming the district court's ruling. See Defs.' Br. 2, 2 n.1, 4-5; Defs.' Br. Exs. A-F.1
III. Procedural History
The procedural history in this case is short. Penn and Clymer filed their Complaint on November 11, 2017. They alleged six claims: Count I-breach of contract; Count II-breach of oral contract; Count III-breach of implied contract; Count IV-negligence; Count V-professional negligence; and Count VI-direct negligence (against Penn and Clymer personally). After Defendants filed their motion to dismiss, Counts IV (negligence) and VI (direct negligence) were dismissed by agreement. ORDER (ECF No. 20).
STANDARDS GOVERNING MOTIONS TO DISMISS UNDER FED. R. CIV. P. 12(b)(6)
The standards governing motions to dismiss under Fed. R. Civ. P. 12(b)(6) are clear:
Federal Rule of Civil Procedure 8(a)(2) requires only "a short and plain statement of the claim showing that the pleader is entitled to relief." When ruling on a motion to dismiss [pursuant to Fed. R. Civ. P. 12(b)(6) ], courts must accept as true all of the factual allegations contained in the complaint and draw all reasonable inferences in favor of the plaintiff.
To survive a motion to dismiss, Plaintiffs' factual allegations, taken as true, must "state a claim to relief that is plausible on its face." The plausibility standard is not a probability requirement, but "asks for more than a sheer possibility that a defendant has acted unlawfully." Although it is true that "the complaint must contain sufficient facts to state a claim that is plausible on its face, it nevertheless need only give the defendant fair notice of what the claim is and the grounds on which it rests." Thus, we have emphasized that "a complaint is to be construed liberally so as to do substantial justice."
Hall v. DIRECTV, LLC, 846 F.3d 757, 765 (4th Cir. 2017) (citations omitted).
Defendants argue, inter alia, that all counts are barred by applicable statutes of limitations. See Defs.' Br. 2. The Court agrees and therefore grants Defendants' motion on that ground.
I. Choice of Law
A preliminary matter involves which state's law governs the relevant issues in this case. There is no dispute between the parties that Virginia law governs the statutes of limitations questions at issue here (including when a claim accrues), and the Court concurs in the parties' assessment. See Defs.' Br. 5; Pls.' Opp'n 4 n.8.
II. The Relevant Statutes of Limitations
Under Virginia law, for actions upon a written contract, the limitations period is five years. See Va. Code Ann. § 8.01-246(2). For actions upon an unwritten contract, the statute of limitations is three years. See id. § 8.01-246(4). For professional negligence claims, the limitations period is the same as for breach of contract. See Browning v. Tiger's Eye Benefits Consulting, 313 F. App'x 656, 664 (4th Cir. 2009); White v. BB & T Ins. Servs., Inc., 7:10-cv-467, 2012 WL 3018048, at *5, 7 (W.D. Va. July 23, 2012).
*3 The remaining claims involve only breach of contract and professional negligence. Consequently, the applicable limitations period is, at most, five years. The parties do not dispute this conclusion. See Defs.' Br. 7-8, 13; Pls.' Opp'n 4 n.8.
III. Accrual
A. The Parties' Arguments
The main dispute in this case involves when the claims accrued. Defendants argue that the statutes of limitations began to run no later than 2004, when the inadequate policy was issued. Defs.' Br. 8, 12-13. They also note that, even using the date of Penn and Clymer's accident (in 2005) or the date that the declaratory judgment action was resolved (in 2009) as the accrual date, Penn and Clymer's claims are time barred. See Defs.' Br. 9, 12-13.
Penn and Clymer respond that injury is necessary for a claim to accrue, and they contend that no injury occurred until the judgments in their favor were entered against Barker & Son (less than one year before this action was filed) because, before that time, the insurer provided all that it had promised (by satisfying its duty to defend). See Pls.' Opp'n 5-12.
Defendants reply that injury occurred when the improper policy was issued. See Defs.' Reply Br. 5-10. They also note that Penn and Clymer suffered another injury in 2005, when the accident occurred, because after that date Barker could not secure proper insurance to cover the accident. Defs.' Reply Br. 9. And, they observe that Penn and Clymer were again injured in 2009 when it was conclusively determined that the policy provided only $100, 000 in coverage. Defs.' Reply Br. 9. In short, Penn and Clymer suffered several injuries that triggered accrual long enough ago to render the claims untimely.
B. Virginia Accrual Law
1. Va. Code Ann. § 8.01-230
The core of Virginia accrual law is Va. Code Ann. § 8.01-230. That provision states:
In every action for which a limitation period is prescribed, the right of action shall be deemed to accrue and the prescribed limitation period shall begin to run from the date the injury is sustained in the case of injury to the person or damage to property, when the breach of contract occurs in actions ex contractu and not when the resulting damage is discovered, except where the relief sought is solely equitable or where otherwise provided under § 8.01-233, subsection C of § 8.01-245, §§ 8.01-249, 8.01-250 or other statute.
Va. Code Ann. § 8.01-230 (emphasis added).2
2. Applicable Case Law & Accrual Standards
Although Va. Code Ann. § 8.01-230 provides basic guidance as to Virginia accrual law, Virginia decisional law has set forth the principles that control the resolution of the accrual question here.
i. The Necessity of Injury
As an initial matter, the parties are correct that an "injury" is necessary for a claim to accrue under Virginia law (even as to contract-oriented or professional negligence claims). See Hensel Phelps Constr. Co. v. Thompson Masonry Contractor, Inc., 791 S.E.2d 734, 740 (Va. 2016); Thorsen v. Richmond SPCA, 786 S.E.2d 453, 465 (Va. 2016); Van Dam v. Gay, 699 S.E.2d 480, 482-83 (Va. 2010). And, "a statute of limitations usually commences to run when injury is incurred as a result of a wrongful act." Kiser v. A.W. Chesterton Co., 736 S.E.2d 910, 916 (Va. 2013).
ii. Injury Sufficient for Accrual
*4 Although injury is necessary for a claim to accrue, the relevant injury need not be substantial in degree or easy to discover. As the Supreme Court of Virginia has explained:
Some injury or damage, however slight, is essential to a cause of action, but it is immaterial that all the damages resulting from the injury do not occur at the time of the injury. The running of the limitation period will not be tolled by the fact that actual or substantial damages did not occur until a later date. Difficulty in ascertaining the existence of a cause of action is similarly irrelevant.
Van Dam, 699 S.E.2d at 482-83.
In accordance with this principle, the Supreme Court of Virginia has held, on numerous occasions, that measurable or meaningful damages are not necessary for claims to accrue. Rather, any fixed injury is sufficient.
For example, in Van Dam, an attorney negotiated a divorce property settlement that allocated the husband's survivor benefits from his federal retirement pay to his wife. Van Dam, 699 S.E.2d at 480. That settlement was incorporated into the final divorce decree, but the wife was ultimately denied the survivor benefits under federal law. Id. In a legal malpractice action against the attorney, the Supreme Court of Virginia held that "the plaintiff suffered a legal injury arising out of the defendant's malpractice when the final decree of divorce, incorporating the defective property settlement agreement, was entered by the circuit court," not, as the plaintiff argued, on "the death of her former husband in 2006, when her right to survivors' benefits would have arisen but for the defendant's malpractice." Id. at 481-82.3 As the Supreme Court of Virginia later explained, "[a]lthough the plaintiff in Van Dam similarly suffered primary monetary damage at the time of her ex-husband's death due to lost survivor benefits, the Court found some initial injury took place at the time the divorce decree was entered," which was "when the parties' rights were fixed." Thorsen, 786 S.E.2d at 466.
The Thorsen and Van Dam courts also discussed an earlier legal malpractice case, MacLellan v. Throckmorton, 367 S.E.2d 720 (Va. 1988). There, the plaintiff "received erroneous advice on his Property Settlement Agreement [ (that provisions could be modified) ], which was entered by the court as part of his divorce decree, but suffered monetarily from that harm only years later when his income changed." Thorsen, 786 S.E.2d at 466; Van Dam, 699 S.E.2d at 481. Again, however, "the statute of limitations on plaintiff's right of action ran from the entry of the divorce decree, when the parties' rights were fixed." Thorsen, 786 S.E.2d at 466. And:
[The Supreme Court of Virginia] reached [the result in MacLellan] despite the fact that the plaintiff did not become aware of the malpractice until after the limitation period had run, and even if he had been aware of it in time, he would have then been unable to quantify his damages with precision. His injury arising from the attorney's malpractice occurred when the court entered a final decree of divorce incorporating a property settlement agreement that, contrary to the attorney's assurance, was not subject to change.
*5 Van Dam, 699 S.E.2d at 482.
Likewise, in Hensel Phelps Construction Co. v. Thompson Masonry Contractor, Inc., 791 S.E.2d 734 (Va. 2016), subcontractors completed a construction project in a defective manner and were sued by the prime contractor after it was sued by the client. Id. at 736-37. The prime contractor argued that it "had no cause of action upon the breach of performance … until 2014," when the case against the prime contractor settled, because before that time it had "sustained no damages." Id. at 737-38, 740. The Supreme Court of Virginia found that argument to be unavailing, holding that:
Under its subcontracts, had Hensel Phelps diligently attended to inferior work performed pursuant to its contract with the Commonwealth, it could have required subcontractors to fix any faulty or inferior work for five years following the breach in performance. This Court has recently reiterated that, "while some injury or damage, however slight, is required for a cause of action to accrue, 'it is immaterial that all the damages resulting from the injury do not occur at the time of the injury.' "
Id. at 740 (citations omitted). Thus, the prime contractor was harmed by the subcontractors' inferior work under the subcontracts, even if that inferior work did not cause meaningful damages until later.
Finally, in Shipman v. Kruck, 593 S.E.2d 319 (Va. 2004), an attorney "erroneously assessed … trust documents as establishing an irrevocable trust when he advised the Shipmans to file bankruptcy," which resulted in the sale of his clients' residence (and the clients' repurchase of it). Id. at 321. In a malpractice action against the attorney, the clients argued that the statute of limitations did not begin to run until "the bankruptcy court finally adjudicated the Trust to be revocable and therefore a nonexempt part of the Shipmans' bankruptcy estate …. because until that point in time they had no injury or damages." See id. at 322. The Supreme Court of Virginia rejected that position:
Upon the filing of the bankruptcy petition the Shipmans incurred a legal injury. Although the injury could not be delineated as a sum certain or reflected as a final judgment on the merits, there was injury sufficient to commence a cause of action for legal malpractice. First and foremost, the Shipmans lost control of their assets to the Bankruptcy Trustee, including the power to revoke the Trust and receive the reversion. The filing of the bankruptcy, in and of itself, vested those rights in the Bankruptcy Trustee as a matter of law. This injury in particular countermanded their express wishes to protect the Trust property from their creditors. Even the Shipmans' right to bring a legal malpractice claim vested in the Bankruptcy Trustee, which necessitated their initial nonsuit. Further, the Shipmans admitted in their motion for judgment that in addition to the costs of repurchasing their residence, they incurred "additional costs in legal fees, litigation costs, and other costs associated with the bankruptcy filing and litigation."
*6 Id. at 323 (emphasis added) (citations omitted).
iii. When Accrual Occurs in the Failure to Procure Insurance Context
Because of the decisions of the Supreme Court of Virginia on the accrual/injury issue, numerous courts have taken the view that an action for failure to procure insurance accrues when a breach of the duty to procure insurance occurs, such as when a defective policy is placed, not when a payout under the intended policy would have vested.
One example is Cunningham Bros. Used Auto Parts, Inc. v. Zurich American Insurance Co., 6:17-cv-51, 2017 WL 4707464 (W.D. Va. Oct. 19, 2017). There, the plaintiff's renewed insurance policy added an endorsement that left it with no coverage for a fire that disrupted business. Id. at *2. The plaintiff alleged that it had contracted with the insurer that provided the policy "because its agent promised that its coverage would be better at less cost than Plaintiff's existing coverage," that a contract existed whereby the defendant (a third-party entity) "was responsible for servicing [the plaintiff's] insurance needs through [the insurer]," and that the defendant breached that contract by "failing to perform three duties: (1) alert [the plaintiff] of [the endorsement's] negative impact on its coverage; (2) prevent the endorsement from being added by having Plaintiff submit a statement of financial condition; and (3) ensure that [the plaintiff's] original coverage remained intact." Id. at *1-2 (citations omitted). The plaintiff argued that "there could have been no cause of action," and hence no running of the statute of limitations, "until there was actually harm to Plaintiff in the form of losing its expected insurance payout as a result of the loss." Id. at *3.
The district court, however, held that "the statute of limitations began running the moment the [renewed] insurance contract in effect was signed." Cunningham, 2017 WL 4707464, at *3-4. It observed that "the statute of limitations starts to run at the first sign of injury-no matter how slight or minor." Id. at *4. It took the view that the plaintiff was "injured" when the defendant "fail[ed] to adequately inform Plaintiff of the consequences of signing the insurance contract" and the plaintiff "lost its bargain to receive coverage equal to or better than what it had before." Id. at *3-4.4
Likewise, in Mulvey Construction, Inc. v. Bituminous Casualty Corp., 571 F. App'x 150 (4th Cir. 2014), a third-party insurance agency issued certificates of insurance stating that two companies had been added to an existing insurance policy when, in fact, those companies had not been made additional insureds. Id. at 152-53. The insurer later refused to defend the two companies in a lawsuit, and one of the companies (and its insurer) sued for a declaratory judgment that they were entitled to coverage and payment. Id. at 153. The Fourth Circuit, by unpublished disposition, concluded that any breach of the contract requiring the third-party insurance agency to obtain insurance occurred no later than the date that the "final certificate of insurance-the contract Appellants assert required their being insured by [the insurer]-was issued" despite the fact that "Appellants were never added to the insurance." Id. at 162. The Court of Appeals based that conclusion on the fact that, "[u]nder Virginia law, the statute of limitations accrues on the date of breach, not the date of [sic] the resulting damage is discovered." Id. The Fourth Circuit, in essence, determined that injury occurred at the moment the contract that erroneously stated that the companies had been made additional insureds was issued by the third-party insurance agency. At that time, the contractual rights became fixed, and the companies lost the benefit of their agreement.5
*7 Finally, in Autumn Ridge, L.P. v. Acordia of Virginia Insurance Agency, Inc., 613 S.E.2d 435 (Va. 2005), an insurance broker failed to procure insurance that listed certain limited partnerships as named insureds. Id. at 436-38. The Supreme Court of Virginia held:
that, when the intended insured suffers a loss, the measure of damages for failure to procure insurance is the amount that would have been due under the policy. However, when no loss has occurred, the measure of damages is the amount paid by the intended insured as the premium. "In case of a failure to issue a policy, the right to recover is fully matured when the agreement is violated, and the party to whom it was to be issued is not obliged to wait until his property is destroyed … before instituting an action for damages."
Id. at 440 (emphasis added) (citations omitted).6 Although Autumn Ridge was not addressing a statute of limitations issue, the decision clearly informs the accrual question.7
3. Conclusion as to Accrual
In sum, it is clear that, for a claim to accrue, only a very slight injury is required. In the failure to procure insurance context, sufficient injury (and accrual) occurs when the duty to procure adequate insurance is violated in some fixed manner, such as when a deficient policy is signed or placed.
C. Analysis
The position of Penn and Clymer that no claim accrued until the judgments were entered against Barker & Son cannot be supported, given the foregoing principles. Their primary argument is that "no injury happened pre-judgment" because the insurer never breached its duty to defend. Pls.' Opp'n 10-11. In particular, the argument seems to be that, because monetary losses caused by Defendants' failure to procure the proper policy were contingent upon Barker losing in court (after being defended by the insurer), no injury occurred until Barker in fact lost.
That view, however, rests upon a misunderstanding of Virginia accrual law. As set out above, a claim accrues in the failure to procure insurance setting when a fixed violation of the duty to obtain insurance occurs, such as when a deficient insurance policy is issued. That is because only a slight injury as a result of the breach is necessary to trigger accrual. Loss of the "bargain to receive [the] coverage" sought is sufficient. See Cunningham, 2017 WL 4707464, at *3-4.
*8 To be sure, an injury occurred once judgments were entered against Barker & Son and the insurer refused to pay more than the coverage limits of the inadequate policy. But, the first injury occurred when Defendants saddled Barker with an insurance policy that did not contain the terms that Barker had contracted with Defendants and relied on them to obtain. It was at that point that Defendants' duty to procure insurance was violated and fixed injury occurred (given that Barker was now bound by an insurance contract that did not meet its needs or expectations).
It is true that, as Penn and Clymer suggest, substantial damages were contingent until the judgments were entered. See Pls.' Opp'n 10-11. But, that is of no moment, for two reasons. First, the Supreme Court of Virginia has expressly held that, "[i]n case of a failure to issue a policy, the right to recover is fully matured when the agreement is violated, and the party to whom it was to be issued is not obliged to wait until his property is destroyed," i.e., until a covered loss occurs, "before instituting an action for damages." See Autumn Ridge, 613 S.E.2d at 440 (citations omitted). Thus, the "contingency" of a policy-triggering loss is irrelevant to when a claim for failure to procure insurance accrues.
Second, it is clear that slight injury (even that which "could not be delineated as a sum certain or reflected as a final judgment on the merits") is sufficient, notwithstanding that the lion's share of damages are contingent. See Shipman, 593 S.E.2d at 323. Hence, in Hensel Phelps, injury was found to have occurred when the subcontractors performed deficient work, even though monetary losses were contingent on whether the prime contractor would be sued and settle (or lose). Hensel Phelps, 791 S.E.2d at 736-37, 740. Likewise, in Van Dam, injury was found to have attached when the divorce decree was entered, even though the primary losses were contingent upon a later determination that the plaintiff was ineligible for her ex-husband's survivor rights. Van Dam, 699 S.E.2d at 480-82; see also Thorsen, 786 S.E.2d at 466. Similarly, in MacLellan, injury occurred when the divorce decree was entered, even though any substantive damages were contingent upon the plaintiff's income changing and him seeking (in vain) to alter the agreement. See Thorsen, 786 S.E.2d at 466; Van Dam, 699 S.E.2d at 481-82. And, in Shipman, the plaintiff was injured "[u]pon the filing of the bankruptcy petition," even though any meaningful losses were contingent upon the bankruptcy court finding the trust at issue to be revocable. Shipman, 593 S.E.2d at 322-23.
In sum, the duty to procure insurance was breached and the first injury occurred when the legally insufficient policy was placed by Defendants. On that date, this action accrued within the meaning of Va. Code Ann. § 8.01-230, and the statutes of limitations began to run then.8
IV. Extrinsic Evidence & the Relevant Facts
*9 The second major dispute between the parties is whether the Court may rely upon extrinsic evidence to establish facts relevant to accrual, particularly the timelines applicable to the statutes of limitations issue. Defendants ask the Court to consider the documents attached to their brief. See Defs.' Br. 4. They point out, as set forth above, that "Plaintiffs do not provide a single date for any of [the relevant] events in their eleven-page Complaint." Defs.' Br. 2.
Penn and Clymer counter that "[t]he policy documents [Defendants] offer are not admitted as authentic or accurate by [Penn and Clymer], and they never have been" (either in this action or the declaratory judgment action). Pls.' Opp'n 13-14. They suggest (but offer no support on the point) that it is possible that the policy was formally issued after coverage began. Pls.' Opp'n 13, 13 n.12. Thus, they claim, "at least a factual question remains as to when the policy here actually issued." Pls.' Opp'n 14.
Defendants reply, in essence, by contesting the credibility of the refusal to admit the authenticity of the documents. See Defs.' Reply Br. 10-11. They assert that Penn and Clymer previously, in the declaratory judgment action, asked this Court to determine the amount of coverage under the policy and stated that the terms of the policy were undisputed, and that, therefore, judicial estoppel should apply here. Defs.' Reply Br. 10-11.
B. The Relevant Law
The legal standards necessary to resolve this issue are straightforward. As this Court has explained:
Ordinarily, [on a motion to dismiss,] a court may not consider any documents that are outside of the complaint, or not expressly incorporated therein, without converting the motion into one for summary judgment. However, there are a number of exceptions to this rule. Specifically, a court "may consider official public records, documents central to a plaintiff's claim, and documents sufficiently referred to in the complaint, so long as the authenticity of these documents is not disputed," without converting the motion into a motion for summary judgment.
Stoney Glen, LLC v. S. Bank & Tr. Co., 944 F. Supp. 2d 460, 464 (E.D. Va. 2013) (citations omitted); see also Rockville Cars, LLC v. City of Rockville, 891 F.3d 141, 145 (4th Cir. 2018) ("While considering a 12 (b) (6) motion, we 'may consider documents attached to the complaint or the motion to dismiss 'so long as they are integral to the complaint and authentic.' ' " (citations omitted) ); Witthohn v. Fed. Ins. Co., 164 F. App'x 395, 396-97 (4th Cir. 2006) (per curiam) ("[T]here are exceptions to the rule that a court may not consider any documents outside of the complaint. Specifically, a court may consider official public records, documents central to plaintiff's claim, and documents sufficiently referred to in the complaint so long as the authenticity of these documents is not disputed.").9
*10 Penn and Clymer have taken a distinctly ostrich-like approach to the statutes of limitations issue in this case. They omitted any and all references to time in their Complaint. Compl. *1-11. They even omitted such basic facts as when the policy over which they are suing was issued and when the accident in this case occurred. Compl. *1-11. They have also omitted reference to documents that might time-stamp the events depicted in their Complaint, such as the declaratory judgment decision. Compl. *1-11. Then, when Defendants proffer documents that establish the omitted timeline, Penn and Clymer (weakly) fight the documents' authenticity. Pls.' Opp'n 13-14. They seem to be hoping that, if they can bury their heads in the sand as to the statutes of limitations issue for long enough, it will go away. Unfortunately for them, it will not. And, Penn and Clymer have failed to hide the relevant timeline well enough to prevent the Court from considering it now.10
As set forth above, certain extrinsic documents may be considered on a motion to dismiss so long as the documents' authenticity is not questioned. Here, it is arguable that the authenticity of "[t]he policy documents [Defendants] offer" is disputed. See Pls.' Opp'n 13. So, the Court will not consider those documents.
However, nothing in the Opposition submitted by Penn and Clymer suggests that they dispute any of the other documents relied on by Defendants, i.e., those that are not "policy documents." See Pls.' Opp'n 13-14. There seems to be no quarrel with, for example, the authenticity of the Fourth Circuit's opinion in the declaratory judgment action. See Defs.' Br. F (Canal Ins. Co v. Barker, 358 F. App'x 470 (4th Cir. 2009) (per curiam) ). Indeed, they implicitly concede that the declaratory judgment action related to the policy here. See Pls.' Opp'n 14 ("Nor did adequate discovery happen in the earlier declaratory judgment action to allow [Penn and Clymer] to uncover [details respecting when the policy here actually issued]."). At best, Penn and Clymer assert that they never admitted that the policy document offered by the insurer in that action was accurate. Pls.' Opp'n 13-14. But, that relates to the specifics of the policy, not the authenticity of the Fourth Circuit's opinion or its connection to the policy at issue here (whatever its precise terms or contents).11
The Fourth Circuit opinion is obviously a public record. It is also independently central to the claims of Penn and Clymer because it resolved the coverage amounts provided by the policy at issue. See Defs.' Ex. F 3 ("The district court rejected Appellants' contention that Virginia Code § 46.2-2143 or federal regulations would operate to increase the policy's limit to $750,000 … and instead granted Canal's Motion for Judgment on the Pleadings that the policy was limited to the face amount of $100,000 listed on its declaration page. We agree and affirm the judgment."). Cf. Compl. *2 ("But Barker's policy placed by [Defendants] provided only $100,000 in liability coverage, not the $750,000 minimum financial responsibility protection required under federal law."). Accordingly, and because the authenticity of the Fourth Circuit opinion is not disputed, the Court will consider that opinion here.
*11 As discussed above, the Fourth Circuit opinion decided the actual coverage limits of the policy at issue in this case. Even if the policy was issued after coverage took effect, the issuance date could not have been subsequent to a judicial decision respecting its terms. And, the Fourth Circuit opinion made clear that the policy had been issued before the case was submitted for consideration. See Defs.' Ex. F 3. Thus, Defendants must have placed the policy before the date of the decision. The opinion was issued on December 31, 2009. Defs.' Ex. F 1.12
V. Whether the Statutes of Limitations Have Run
The applicable limitations period is, at most, five years. That period began when the legally insufficient policy was placed by Defendants. This case was filed on November 11, 2017. Even using the date of the Fourth Circuit's opinion in the declaratory judgment action as the accrual date (notwithstanding the fact that the claims quite clearly accrued well before that date), the limitations period would have expired on December 31, 2014. Consequently, the claims presented here by Penn and Clymer are time barred, and DEFENDANTS' RULE 12(b) (6) MOTION TO DISMISS (ECF No. 7) will be granted.
For the reasons set forth above, the Court will grant DEFENDANTS' RULE 12 (b) (6) MOTION TO DISMISS (ECF No. 7). The Complaint (ECF No. 1) will be dismissed with prejudice.
All Citations
Slip Copy, 2018 WL 3468366
Defendants also submitted other documents in the record of the declaratory judgment action with their reply brief. Defs.' Reply Br. Exs. A-B.
The "exception" clause is not relevant here.
That is a harsh rule, but it is settled Virginia law. And, a federal court sitting in diversity is not authorized to revise state decisional law. Any change must be effected by the Supreme Court of Virginia or by the Commonwealth's legislators.
Penn and Clymer suggest that Cunningham was wrongly decided because it conflated a breach of duty with a breach of contract (which requires an injury) and never pointed to an actual injury. See Pls.' Opp'n 5, 17. However, Cunningham directly addressed the injury question, and, in fact, pointed to the injury that triggered the running of the statute of limitations. Cunningham, 2017 WL 4707464, at *3-4.
Cunningham offered an abbreviated description of Mulvey, stating that "[t]he Fourth Circuit has held under similar facts that the three year statute of limitations begins to run the date the insurance contract in question is issued." See Cunningham, 2017 WL 4707464, at *3. It is probably more accurate to say that Mulvey held that the statute of limitations began to run from the date that the agreement to procure insurance was violated in a fixed manner. That does not change the overall correctness of the Cunningham opinion, and it is clear that an agreement to procure insurance would be violated in a fixed manner at the moment a deficient insurance policy is issued.
The Autumn Ridge holding applied to both negligence and breach of contract claims. See Autumn Ridge, 613 S.E.2d at 440.
Any doubt as to that conclusion is obviated by the source of the emphasized sentence in the block-quoted passage: Everett v. O'Leary, 95 N.W. 901, 902 (Minn. 1903). That case, and the emphasized sentence, did relate to when a claim for failure to procure insurance accrues. Id. And, the Everett court went on to clarify: "If, when a suit is brought, there has been no destruction by fire, the plaintiff can recover the amount paid as the premium; and, of course, such an action must be brought within the period of six years-a reasonable time being given in which to issue the policy. The person to whom the policy should have been issued may, however, take chances upon a loss, and, if one occurs, bring his action to recover actual damages; but his right to sue upon a breach of the contract, and consequently the time when that right matures, cannot be made to depend upon the fact of a loss. A cause of action accrues when the holder of the right to bring the action can apply to the court for relief, and is enabled to commence proceedings to enforce his rights, and from this time the statute of limitations is running." Id. at 902-03.
Penn and Clymer argue that Shipman supports their view that the earliest possible injury was the entry of the judgments. See Pls.' Opp'n 11-12 ("Furthermore, in pointing to a judgment as enough injury to start the clock, the Supreme Court of Virginia through Shipman necessarily implied that the mere presence of facts potentially leading to a judgment would not constitute a sufficient injury."). That is erroneous. See Shipman, 593 S.E.2d at 323 ("Upon the filing of the bankruptcy petition the Shipmans incurred a legal injury. Although the injury could not be delineated as a sum certain or reflected as a final judgment on the merits, there was injury sufficient to commence a cause of action for legal malpractice." (emphasis added) ). Shipman did state that "a client who suffers the entry of a judgment against him indeed suffers a legal injury or damage," but it never suggested that no injury can occur before a judgment. See id. at 325-27. And, it made that statement in the specific context of overturning a previous decision that had held that, in an action for legal malpractice, "[w]hen a client has suffered a judgment for money damages as the proximate result of his lawyer's negligence such judgment constitutes actual damages … only to the extent such judgment has been paid." Id. (citations omitted). The court noted that the overturned case did not involve a statute of limitations issue and, in any case, was inconsistent with the rule that "even slight damage sustains a cause of action." See id. at 325-26. Penn and Clymer otherwise discuss Shipman at length and attempt to analogize their case to it, but, as set out above, the principles described in Shipman do not help them. See Pls.' Opp'n 7-11.
Additionally, Penn and Clymer point to Harris v. K & K Ins. Agency, Inc., 453 S.E.2d 284 (Va. 1995). See Pls.' Opp'n 14-16. They contend that it helps their position because the trial court in that case found that a claim accrued not when a flawed policy issued, but rather when an uncovered fire occurred, and the Supreme Court of Virginia did not question that conclusion. See Pls.' Opp'n 15. But, Harris involved certified questions to the Supreme Court of Virginia from the Fourth Circuit, so the Supreme Court of Virginia would not have addressed issues extraneous to the questions presented. See Harris, 453 S.E.2d at 285. And, in any event, the accrual date issue was never appealed to the Fourth Circuit. See Harris v. K & K Ins. Agency, Inc., 53 F.3d 328, 1995 WL 225531, at *2 (4th Cir. 1995) (table) (per curiam). Harris is not relevant.
A statute of limitations defense may be decided upon on a motion to dismiss. See Goodman v. Praxair, Inc., 494 F.3d 458, 464 (4th Cir. 2007). Typically, a court may only do so "if all facts necessary to the affirmative defense 'clearly appear[ ] on the face of the complaint.' " Id. (citations omitted). The Court does not read this principle as barring consideration of other materials that may be properly reviewed in resolving a motion to dismiss. See Guerrero v. Weeks, 1:13-cv-837, 2013 WL 5234248, at *4 n.2 (E.D. Va. Sept. 16, 2013) (deciding to consider extrinsic documents in evaluating a statute of limitations defense on a motion to dismiss), aff'd, 555 F. App'x 264, 265 (4th Cir. 2014) (per curiam).
The Court is troubled by this approach to pleading and briefing, particularly where, as here, the dates have been established as a consequence of earlier litigation.
There can be no doubt that the declaratory judgment action involved the policy at issue here, given the similarities between the declaratory judgment action and this case. According to the Fourth Circuit opinion, the declaratory judgment action dealt with, inter alia: (1) an accident involving Penn and Clymer and Justin Colvard (driving a truck owned by Barker) in Brunswick County, Virginia; (2) an insurance policy issued to Barker that provided $100,000 in coverage, was in force at the time of the accident, and contained no MCS-90 endorsement; and (3) allegations that federal regulations required coverage of $750,000. Defs.' Br. Ex. F 3-5, 16. The Fourth Circuit also observed that 1st Southern was "apparently acting as insurance agent to Barker." Defs.' Br. Ex. F 16.
The policy actually must have been placed far earlier than the date of the Fourth Circuit decision. The opinion and final order of the district court that the Fourth Circuit opinion affirmed were signed on November 14, 2007 (and filed on November 15, 2007). See Defs.' Br. Ex. E; Canal Ins. Co. v. Barker, 3:07-cv-339, 2007 WL 3551508 (E.D. Va. Nov. 15, 2007) (ECF No. 45). The district court's opinion, like that of the Fourth Circuit, resolved the actual coverage limits of the policy and showed that the policy had been issued before the district court rendered its decision. Canal, 2007 WL 3551508, at *1, 6-7. Hence, the policy must have been placed before November 14, 2007.
Previous Previous post: Durham v. Hallmark County Mutual Insurance Co. 2018 WL3469257
Next Next post: Lloyds v. Southern Pride Trucking, 2018 WL 3158821
Motor Carrier Reports
Chameleon Detector
150 Airport Road | Suite 1100
© 2019 Central Analysis Bureau | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 4,333 | [
128000,
29673,
311,
50557,
612,
68640,
198,
14831,
4078,
22413,
34785,
287,
14,
28660,
367,
14,
2250,
5706,
25705,
7089,
198,
32,
15438,
21552,
315,
3293,
3754,
4455,
304,
279,
9048,
19115,
323,
8276,
19647,
627,
19436,
220,
1691,
11,
14398,
220,
717,
198,
19436,
220,
1691,
11,
14398,
220,
24,
198,
19436,
220,
972,
14398,
220,
17,
198,
38402,
320,
679,
24,
340,
19436,
220,
1691,
47124,
320,
679,
23,
340,
19436,
220,
1691,
11,
14398,
220,
806,
11,
47124,
198,
19436,
220,
1691,
11,
14398,
220,
24,
11,
47124,
198,
19436,
220,
508,
11,
14398,
220,
717,
13,
47124,
198,
19436,
220,
508,
11,
14398,
220,
806,
47124,
198,
19436,
220,
508,
11,
14398,
220,
23,
13,
47124,
198,
19436,
220,
508,
11,
14398,
220,
21
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
29673,
311,
50557,
612,
68640,
198,
14831,
4078,
22413,
34785,
287,
14,
28660,
367,
14,
2250,
5706,
25705,
7089,
198,
32,
15438,
21552,
315,
3293,
3754,
4455,
304,
279,
9048,
19115,
323,
8276,
19647,
627,
19436,
220,
1691,
11,
14398,
220,
717,
198,
19436,
220,
1691,
11,
14398,
220,
24,
198,
19436,
220,
972,
14398,
220,
17,
198,
38402,
320,
679,
24,
340,
19436,
220,
1691,
47124,
320,
679,
23,
340,
19436,
220,
1691,
11,
14398,
220,
806,
11,
47124,
198,
19436,
220,
1691,
11,
14398,
220,
24,
11,
47124,
198,
19436,
220,
508,
11,
14398,
220,
717,
13,
47124,
198,
19436,
220,
508,
11,
14398,
220,
806,
47124,
198,
19436,
220,
508,
11,
14398,
220,
23,
13,
47124,
198,
19436,
220,
508,
11,
14398,
220,
21,
-100
] |
2009-05-18: Rubber Girl No More
Summary: Vlad finds July after she lost her powers. Vlad promise her he will get back her powers. In the end they end up arguing
Log TitleRubber Girl No More
Xavier Mansion - Living Room
Cream colored couches and chairs are placed among end tables and a coffee table. A large entertainment center covers one of the blue walls. The windows are set back a bit creating comfortable window seats for those who want to read.
July sighs softly as she remains in the living room, obviously down, and saddened by something, leaned over the table, her arms crossed on the table and her chin resting on her crossed arms, one index finger pressing against the table, poking it again and again, slowly.
Vladimir walks in whistling and spots the down girl. He thinks that's a change she down and I am up." He sits down next to July and rubs her back, "hey there whats wrong I never seen you down before. You look like someone stole your birthday cake and ran over your puppy."
July just looks at you, frowning at you a bit angry. Hard to say if it's because of your words, or the way you're touching her. "What's wrong with this picture?" She asks, dryly, as she lifts a hand and balls her hand in a fist, and then slams it against the table, making a loud impact sound, but her hand doesn't deform. At all.
Vladimir blinks, "wow you are learning how to control your powers better." Once again Vlad showing a high IQ does not lead to being smart, "I don't get it why would you be down about that?"
July frowns even more, angry, "My powers are -GONE-!" she says, annoyed. "Haven't you heard? An explosion outside the mansion, and then a green goo thing stealing people's powers!?"
Vladimir frowns, "I heard bit of it I was out when it attack. I know some green blob attacked and some fought it but I didn't know this." He rubs your back some more, "Listen July I do anything in my power to get your power back."
July pffts at that, "You'll only get your own powers drained." She shakes her head, "Half the school is depowered, and, from what I've seen on the TV, some heroes and villains at NYC were depowered as well."
Vladimir nods, "well if I lose my powers no big deal it's not like they did must good for me." He looks you over, "I don't get it I thought you would be happy about this don't it mean you can go home and you can be a normal teen girl not just being something to be hidden."
July groans softly, "I NEVER said I wanted to get rid of my powers, Vlad." she says, frowning still, "I liked them! I didn't want to get rid of them!"
Vladimir nods, "oh okay well I sorry then and like I said I do everything in my power to get them back."
July sighs, "Just forget about it. That thing is still rampaging around, wielding the powers of more than fifteen different mutants. That thing's unstoppable now…"
Vladimir frowns and thinks, "it has your powers meaning it can grab from far. Who else does it have?"
July sighs softly, "As far as I can tell, it has my powers, Kael's, Sam's powers, Scott's powers… Addison's… Max's…"
Vladimir whistles, "that's some line up. Does it have any fire or ice powers?"
July chuckles softly, "Max' powers are ice based. Remember?" she says, shaking her head softly, "Plus he has Sam's flying powers, so it's a bit fire as well."
Vladimir nods, "oh well I never seen Max's powers or Sam's. Shot this might be harder then I was hoping."
July nods softly, "As far as I can tell it hast stretching powers, mind-reading powers, control over ice and wind, light, and can fly."
Vladimir nods, "Well that's one super powerful blob."
July sighs and nods again, "Yeah. And I don't think there's anyone, or anything that can stop it right now, with all those powers it has." She shakes her head.
Vladimir frowns and leans back thinking, "well there might be one person" He looks at you, "you might be able to. Tell me is there any flaws in your powers?"
July blinks softly at you, and then she frowns, "… What?"
Vladimir shrugs, "well well if it has your power then it must have your limits and flaws. It's like when some in the comics steal superman's power that green rock from his home land effects the person."
July arches one eyebrow, "I somehow doubt so." she says, shaking her head, "That thing absorbed Mr. Summer's powers, but got none of the flaws. That thing could control the blasts."
Vladimir frowns, "then I have no idea then."
July nods, "I told you. That thing is the most powerful thing around. I fear it's only a matter of time before it absorb a power that makes it invulnerable, then we're toast."
Vladimir sighs, "fuck that. I not going hide in a corner and let it keep getting stronger we have to stop it."
July sighs softly, "What can we do? I got no powers, and that thing is getting stronger by the minute! That thing apparently has no weaknesses!"
Vladimir frowns, "your powers are not you. You can pick up a weapon and fight still or you can help thoughts who do."
July shakes her head, "You don't understand, Vlad. I got barely into the group combat simulations at the Danger Room. I'm no hero." she frowns, "That thing outside isn't a common robber that breaks into houses to steal. It's a freaking monster that steals powers from mutants, and has already absorbed more than fifteen different powers!"
Vladimir shakes his head, "It might be a monster but will are the villagers July we need to get out pitchforks and torches we can drive this monster away or even kill it."
July looks at you with a deadpan expression, "Vlad, this isn't a 'Frankenstein' novel. That monster doesn't have a heart. If we arrive with pitchforks and torches, it'll just optic blast us to smithereens, or freeze us in blocks of ice, or burn us to a crisp, or worse."
Vladimir sighs, "the pitchfork and torches are just metaphor for raising up and fighting it. Even Mr. Summers can't take on a whole mob on it's own."
July chuckles, "No, Mr. Summers can't. But he could if he could read minds, stretch his body, fire eye laser beams, throw fire from his hands, or ice from his hands, plus control wind, and fly." she points out.
Vladimir frowns, "Can it use more then one power at a time?"
July nods, "I saw him control wind and fire Mr. Summer's blasts and stretch its body at the same time."
Vladimir nods, "that does make it harder." He thinks, "maybe we can lure it into the danger room set the setting to max and let it fight until it's to weak to fight."
July shakes her head, "I don't know. We don't know what it's after, after all." she says, hrm'ing a bit, "I still say we leave this to the professionals."
Vladimir blinks, "didn't you say that scott and a few other heroes have lost there powers? Who more professional then them?" He sighs, "This thing is a danger to all mutant kind and we must rally and stop this monster."
July sighs, "We have ZERO experience with real combats, Vlad. And I'm not talking about just the X-men. There's the Avengers and even the Fantastic Four around." she shakes her head softly.
Vladimir sighs, "they all started with zero experience all of them had to learn in combat."
July nods to that, "Sort of. They at least got more time within the Danger Room than we had. Also, I'm sure they started with missions easier than 'Global-scale threats' like this one." she shakes her head now.
Vladimir sighs, "we do not have a choose we will have to be trained in battle. We may not have the skills of the real x-men but they need us hell all mutant kind needs us."
July frowns softly, "Stop playing the hero, Vlad. If you go out there you'll only get yourself drained of your powers, or, worse comes to worse, get yourself killed. Right now, we can't do squat about it. Even if I had my powers, I wouldn't be able to do anything. That thing absorbs the powers of anyone it touches. Leave it to the Avengers, or the Fantastic Four, like I said. If we rush in now, we'll only make matters worse. If they /need/ our help, they'll contact us, and tell us what to do."
Vladimir looks over at July, "and if it comes back what then? If this thing is like an animal it knows this a place it can eat it will return only way we will be safe is to leave or stop it."
July frowns, "It just took out our powers and ran away. That's all it did. It didn't stay to fight, or else I'd be dead, along with Mr. Summers, Sam, Max, Eddie and other students."
X-Mansion> Bobby would run around with a Nerf gun, randomly shooting people on the street, with a yell of 'ha-HA!' before I ran away screaming.
Vladimir shakes his head, "I don't know maybe it feeds on mutant powers."
X-Mansion> Eddie just locks himself in his closet at home with his puppy and rabbit and hides!
July sighs, "Maybe it does, maybe it doesn't." She says as she stands up, "All I know is that we should stay out of the way and let the experienced people to deal with it and find a way to restore our powers. We can't, and should not, do anything."
Vladimir shrugs, "maybe but it's not my style."
July hrms, "Maybe not, but you should not, and shall not, interfere, Vladimir. You /know/ you will only make matters worse. Think: what do you think you can do against it? Tell me, please."
Vladimir shrugs, "I don't know yet I do not have the info I need to come up with away to stop it. It must have a weakness or weak spot."
July sighs, "Exactly. And there's no way for you to find that information. You don't know how to use computers, and you don't have the equipment to test that thing." she frowns, "The only way would be facing it one-on-one, and you'd only find yourself powerless, or dead. If you try to stop it, Vlad, I'm not talking to you anymore. I swear! Stop trying to be the hero."
Vladimir sighs, "try to be the slacker people get mad try to protect this place and the people I love people get mad what am I suppose to July! Run hide like a child!? let the crimes against you and the other go unpunished!?"
July frowns, "Leave that to the authorities!" She says, "We don't take the law into our hands! We're merely trainees! Use your head, man, Come on! That thing is /way/ out of your league!
July frowns, "Leave that to the authorities!" She says, "We don't take the law into our hands! We're merely trainees! Use your head, man, Come on! That thing is /way/ out of our league! You don't send a student in the first year of medicine to lead a heart transplant operation! No! You send experienced doctors!"
Vladimir frowns, "Still have to like it." He sighs, "I not use to sitting on my hands."
July sighs and shakes her head, "Neither do I, but I know I'm out of this battle for now. Do whatever you feel like doing, just don't complain about it later when it doesn't work your way." she says, turning around, "I'm going to get some sleep."
julyvladimir
The Rhetorical Goddess Wiki
Because the Truth and That Which Resembles It Belong to the Same Capacity
UCSD Grad Students
...the information exchange and virtual community
SCP繁中沙盒2.0
生命之沙,繁星之盒
CCS Related
Malkavian guide to CCS life | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 9,035 | [
128000,
1049,
24,
12,
2304,
12,
972,
25,
53406,
11617,
2360,
4497,
198,
19791,
25,
30734,
14035,
5887,
1306,
1364,
5675,
1077,
13736,
13,
30734,
11471,
1077,
568,
690,
636,
1203,
1077,
13736,
13,
763,
279,
842,
814,
842,
709,
30674,
198,
2250,
11106,
66814,
655,
11617,
2360,
4497,
198,
55,
31748,
83396,
482,
19048,
10637,
198,
99881,
28296,
27240,
288,
323,
26993,
527,
9277,
4315,
842,
12920,
323,
264,
11033,
2007,
13,
362,
3544,
16924,
4219,
14861,
832,
315,
279,
6437,
14620,
13,
578,
11276,
527,
743,
1203,
264,
2766,
6968,
10882,
3321,
16712,
369,
1884,
889,
1390,
311,
1373,
627,
29527,
31238,
82,
57150,
439,
1364,
8625,
304,
279,
5496,
3130,
11,
14224,
1523,
11,
323,
95017,
555,
2555,
11,
55939,
927,
279,
2007,
11,
1077
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
1049,
24,
12,
2304,
12,
972,
25,
53406,
11617,
2360,
4497,
198,
19791,
25,
30734,
14035,
5887,
1306,
1364,
5675,
1077,
13736,
13,
30734,
11471,
1077,
568,
690,
636,
1203,
1077,
13736,
13,
763,
279,
842,
814,
842,
709,
30674,
198,
2250,
11106,
66814,
655,
11617,
2360,
4497,
198,
55,
31748,
83396,
482,
19048,
10637,
198,
99881,
28296,
27240,
288,
323,
26993,
527,
9277,
4315,
842,
12920,
323,
264,
11033,
2007,
13,
362,
3544,
16924,
4219,
14861,
832,
315,
279,
6437,
14620,
13,
578,
11276,
527,
743,
1203,
264,
2766,
6968,
10882,
3321,
16712,
369,
1884,
889,
1390,
311,
1373,
627,
29527,
31238,
82,
57150,
439,
1364,
8625,
304,
279,
5496,
3130,
11,
14224,
1523,
11,
323,
95017,
555,
2555,
11,
55939,
927,
279,
2007,
11,
1077,
-100
] |
YOU'VE MADE A MESS? WE'LL HELP YOU CLEAN IT UP.
You conducted a successful offering, and raised funds, and that is awesome. But as we all know, the market has changed, and expectations are different. Regulators, investors, and the market-at-large are all watching to see what you do next. YOU have a fiduciary duty to the people who gave you funding for your project, and if you haven't properly accounted for those funds, or spent them as you promised you would, there is a storm brewing, and it is headed directly for YOU. So, if you need to clean things up, now is your chance.
There are more than 2,000 cryptocurrencies in circulation today, most of which were issued pursuant to a whitepaper that contained a plan for the use of the raised funds. Many ICOs purported to raise funds to support a project or business, or to provide an apparent "utility," an unregistered security, that granted access to a native technology platform. Crypto Janitors utilizes that whitepaper to help answer the overarching question: Did the project do what it said it was going to do?
From there, the process turns to key business fundamentals and potential exposures to regulators and investors.
Contact Mike Minihan at [email protected] for more information on how Crypto Janitors can clean up your project. | {
"redpajama_set_name": "RedPajamaC4"
} | 8,724 | [
128000,
57489,
6,
4592,
79799,
362,
386,
10201,
30,
20255,
6,
4178,
56571,
15334,
78100,
8871,
12250,
627,
2675,
13375,
264,
6992,
10209,
11,
323,
9408,
10736,
11,
323,
430,
374,
12738,
13,
2030,
439,
584,
682,
1440,
11,
279,
3157,
706,
5614,
11,
323,
17078,
527,
2204,
13,
3263,
42391,
11,
15167,
11,
323,
279,
3157,
29883,
40248,
527,
682,
10307,
311,
1518,
1148,
499,
656,
1828,
13,
15334,
617,
264,
33204,
43509,
661,
14523,
311,
279,
1274,
889,
6688,
499,
11006,
369,
701,
2447,
11,
323,
422,
499,
9167,
956,
10489,
41853,
369,
1884,
10736,
11,
477,
7543,
1124,
439,
499,
19487,
499,
1053,
11,
1070,
374,
264,
13766,
50259,
11,
323,
433,
374,
19946,
6089,
369,
15334,
13,
2100,
11,
422,
499,
1205,
311,
4335
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
57489,
6,
4592,
79799,
362,
386,
10201,
30,
20255,
6,
4178,
56571,
15334,
78100,
8871,
12250,
627,
2675,
13375,
264,
6992,
10209,
11,
323,
9408,
10736,
11,
323,
430,
374,
12738,
13,
2030,
439,
584,
682,
1440,
11,
279,
3157,
706,
5614,
11,
323,
17078,
527,
2204,
13,
3263,
42391,
11,
15167,
11,
323,
279,
3157,
29883,
40248,
527,
682,
10307,
311,
1518,
1148,
499,
656,
1828,
13,
15334,
617,
264,
33204,
43509,
661,
14523,
311,
279,
1274,
889,
6688,
499,
11006,
369,
701,
2447,
11,
323,
422,
499,
9167,
956,
10489,
41853,
369,
1884,
10736,
11,
477,
7543,
1124,
439,
499,
19487,
499,
1053,
11,
1070,
374,
264,
13766,
50259,
11,
323,
433,
374,
19946,
6089,
369,
15334,
13,
2100,
11,
422,
499,
1205,
311,
4335,
-100
] |
FutureAngels.com
Complete coverage of the Angels minor leagues
About futureangelsdotcom
The Playoff Picture (Through August 30)
Here's an update on where each affiliate stands in their pursuit of the post-season.
Salt Lake — The Pacific Coast League is a full-season league, no split-season schedule, so the Bees must win their division outright to qualify for the playoffs. I'd given them up for dead when they lost three straight August 24-26, but they just beat division leader Colorado Springs three straight to move within 4½ of first place. The Bees are 65-69, the Sky Sox are 69-64. Tacoma (69-66) is in second place, one game behind Colorado Springs. The Bees have nine games left, including today's game at Colorado Springs and then four on the road at Tacoma. They ain't dead yet.
Arkansas — The Travelers finished 28-42 in the first half, ten games behind Springfield in the Texas League North Division. They're currently 28-33 in the second half, five games behind Northwest Arkansas (33-28). Tulsa (32-29) trails Northwest Arkansas by a game. The Travs and Springfield are tied at 28-33. They have nine games left on the schedule — two against Springfield, then four at home at Northwest Arkansas, and finally three on the road at Springfield. The Travs remain on the periphery with a little more than a week to go; if they go off on a hot streak they still have a chance.
Rancho Cucamonga — The Quakes finished 30-40 in the first half, 13 games behind South Division first-half winner High Desert. The California League has rather unusual post-season eligibility rules. The first-half winner in each division get a bye, while the second-half winner faces the team with the next best overall record in a best-of-three series. If High Desert wins both halves, then the teams with the second and third best records will face each other. In the second half, the Quakes are 29-33, six games behind the Mavericks (35-27). They've won three of their last four but lost power-hitter Matt Sweeney in the Scott Kazmir trade. They're currently two games behind Lake Elsinore (31-31) and two games ahead of Lancaster (27-35). In the overall standings, after the Mavs the Storm (70-62) have clinched the second-best record so the Quakes (59-73) must finish third overall to qualify for the wild card. They currently have a two-game lead over Inland Empire (57-75) with eight games to go, none of them against division opponents. To make it simple, the Quakes have to hold that third-place lead through the rest of the regular season to make the playoffs.
Cedar Rapids — The Kernels finished 40-30 in the first half, good enough for second place one game behind Kane County, so under Midwest League rules they're in. They'll face the Peoria Chiefs in the first round of the West Division playoffs.
Orem — Tom Kotchman does it again. The Owlz' 20-18 first half record in the Pioneer League's South Division was only good enough for third place, so they need to win the division outright in the second half. As Kotch teams almost always do, they kicked into high gear in the second half for a 22-3 record so far and a seven-game lead over Idaho Falls (15-10). Rival Ogden won the first half. The Owlz have 13 games left in the second half, so short of a total collapse they're going to the post-season. Garrett Richards continues to emerge as the staff ace, striking out eight and walking none in eight shutout innings last night at Idaho Falls.
Tempe — The Tempe Angels beat the Scottsdale Giants 1-0 last night in 12 innings in their regular season finale, to finish in a 20-8 first-place tie with the Giants. They meet tonight at 7:00 PM MDT at Scottsdale for a one-game playoff to determine the East Division champion. The winner goes on to play the West Division champion Peoria Mariners on Monday for the Arizona League title. Tempe's overall record for the season was 38-18, one game behind Scottsdale (39-17).
Written by Stephen C. Smith Posted in Dailies Tagged with Angels, Arkansas Travelers, Cedar Rapids Kernels, Orem Owlz, Rancho Cucamonga Quakes, Salt Lake Bees, Tempe Angels
Tempe Angels Qualify for the Playoffs
Tempe Angels Eliminated from Playoffs
Stephen C. Smith
The First Angels' No-Hitter
2001: A Draft Odyssey
Ervin Santana's Journey to a No-Hitter
yoshefur on Nick Adenhart Update
jeanne on Contactball 101
www.powertoolslabs.net on Arizona Fall League Assignments
Michaelmig on Notes from Orem, Day 2
Michaelmig on Nick Adenhart Memorial
Administration/General Angels Arkansas Travelers Astros Athletics Audio Interviews/Clips Bakersfield Blaze Bees Blue Jays Boise Hawks Braves Brewers Casa Grande Cedar Rapids Kernels Cubs Dallas-Ft. Worth Rangers Diamondbacks Dodgers DSL Angels El Paso Florida FWBL Giants History Holtville Inland Empire 66ers Instructional League/Arizona Fall League Kernels Los Angeles Angels of Anaheim Marlins Mets Nationals odd man out Orem Owlz Orioles Owlz Padres Phillies Polls Provo Angels Quad Cities Quakes Rancho Cucamonga Quakes Rangers Rays Red Sox Royals Salt Lake Bees San Jose Seattle Spring Training Statesville Owls Tempe Angels Travelers Tri-City Video Interviews/Clips Webcasts White Sox Yankees | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 5,945 | [
128000,
25184,
10976,
2053,
916,
198,
12833,
10401,
315,
279,
43145,
9099,
39459,
198,
10714,
3938,
526,
2053,
16510,
884,
198,
791,
95213,
25586,
320,
24798,
6287,
220,
966,
340,
8586,
596,
459,
2713,
389,
1405,
1855,
22325,
13656,
304,
872,
33436,
315,
279,
1772,
31300,
627,
48418,
11940,
2001,
578,
16867,
16377,
9130,
374,
264,
2539,
31300,
10966,
11,
912,
6859,
31300,
9899,
11,
779,
279,
2893,
288,
2011,
3243,
872,
13096,
40228,
311,
26456,
369,
279,
31855,
13,
358,
4265,
2728,
1124,
709,
369,
5710,
994,
814,
5675,
2380,
7833,
6287,
220,
1187,
12,
1627,
11,
719,
814,
1120,
9567,
13096,
7808,
15745,
30304,
2380,
7833,
311,
3351,
2949,
220,
19,
27154,
315,
1176,
2035,
13,
578,
2893,
288,
527,
220,
2397,
12,
3076,
11,
279
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
25184,
10976,
2053,
916,
198,
12833,
10401,
315,
279,
43145,
9099,
39459,
198,
10714,
3938,
526,
2053,
16510,
884,
198,
791,
95213,
25586,
320,
24798,
6287,
220,
966,
340,
8586,
596,
459,
2713,
389,
1405,
1855,
22325,
13656,
304,
872,
33436,
315,
279,
1772,
31300,
627,
48418,
11940,
2001,
578,
16867,
16377,
9130,
374,
264,
2539,
31300,
10966,
11,
912,
6859,
31300,
9899,
11,
779,
279,
2893,
288,
2011,
3243,
872,
13096,
40228,
311,
26456,
369,
279,
31855,
13,
358,
4265,
2728,
1124,
709,
369,
5710,
994,
814,
5675,
2380,
7833,
6287,
220,
1187,
12,
1627,
11,
719,
814,
1120,
9567,
13096,
7808,
15745,
30304,
2380,
7833,
311,
3351,
2949,
220,
19,
27154,
315,
1176,
2035,
13,
578,
2893,
288,
527,
220,
2397,
12,
3076,
11,
279,
-100
] |
Prison Term Policy Research Paper
Prison Term Policy Recommendation CJA/323 September 19, 2011 Jacqueline Waltman Abstract As a criminologist and someone who works as an advisor to a member of the state legislature that will soon hold a vote on a bill that will determine whether or not the maximum prison term for any person who is convicted of armed robbery should be doubled I will do my best to give an opinionated view on this subject that will be substantial enough for the person to whom I am advising to make a quality decision. My boss understands that the bill being placed before us is one that is incredibly popular but questions the merit of the bill because they are afraid the new legislation will not do much good. I will advise my boss by making recommendations…show more content…
Armed robbery falls under the title Larceny and is a crime of theft. It is categorized as it is due to the perpetrators use of threat of force and force. This is why often when a suspect is charged with 'larceny and theft' along with 'robbery,' here robbery would be the crime that would garner the harsher punishment. Laws differ when it comes to sentencing in each state when a verdict of guilty of the crime of armed robbery is…show more content…
There is little question that the public leans toward a punishment that is harsher for those who commit acts of armed robber. The public would the people are who innocent and inevitably be the victims who would be the targets for those criminals. The public would be in full support of a motion that punishes those who perform these acts more harshly than they are being punished now in the hopes that the new legislation would act as deterrence. It has been a common theory that harsher punishments would indeed be effective as deterrents to such acts of deviance as armed robbery. Acts of armed robbery that end in violence or homicide tend to render the public outraged and give their voice a stronger demand for justice to be done. If we choose to take the stance that our criminal justice system is mean to only keep society safe and that justice is carried out then we need to recognize that the laws we have in place currently are set in place to do so. In theory we could see how enforcing a harsher sentence to those who choose to commit violent acts or armed robbery would work as a deterrent to prevent criminals from committing the act as often as they do
The Criminal Control Model
This right here says it all. The government is trying to hide the rights of the offenders just so they can back up the information. The government wants to have swift punishment on the offender. I agree 100% with the Criminal Control Model because like I stated before, the government would waste their time and money just to look up everyone's case and prove them not guilty. With The Crime Control Model It allows the government room to breathe but also allows them to do searches and studies to make find out if the offender is really innocent or in guilty of the
Double Prison Term Research Paper
Double Prison Term For Armed Robbery Name Class Date Instructor Double Prison Term for Armed Robbery Robbery is considered a crime of theft and can be classified as larceny by force or by threat of force. "The taking of money or goods in the possession of another, from his or her person or immediate presence, by force or intimidation" (Farlex, 2012). A bill is a suggested law that has to be passed by the legislature before it can become a law. It also has to be approved by the executive, in most cases. A bill that would double the prison term for anyone convicted of armed robbery is a great notion.
Prison Term Policy Analysis
University of Phoenix Prison Term Policy Recommendation Criminology I am a criminologist advisor I was appointed by the members of the state legislature to work on implementing a new bill on doubling a maximum sentence for someone who may be convicted of armed robbery. As the hire criminologist advisor, I was chosen to present to the state legislature with a prison term policy on armed robbery. The state legislature will determine if to change to a new bill. This new bill will determine if the new prison term policy should have any effect on anyone convicted of armed robbery crime to be given a double maximum sentence. I will research and make a proposal if I am certain a new bill in place will do any justice.
Prison Term Research Paper
Prison Term Paper The cause for this paper is intended to give various reasoning on what sanctions are made and the reasons for implementing them. Whether the reasoning is beyond the opinions of viewers and legislature, as a criminologist I can give my professional opinion as well as my personal opinion on what is needed to be done to reduce the crimes of armed robbery. The definition of robbery would be for Robbery would consist of one or more persons forcefully taking valuables or personals without ones permission by over powering them. While conducting research have to make a professional judgment that will better the criminal justice system. Although this new bill maybe intended to pass criminologist and legislatures need to view the outlooks of this situation and view it from different standpoints in life.
"How Restorative Justice provide a satisfactory outcome for victims and offenders?" 'Restorative Justice is a problem-solving approach to crime which involves the parties themselves and the community generally, in an active relationship with statutory agencies.' (Johnstone 2004:5) As mentioned in Johnstone, G (2004), in the modern west, the best way of responding to a crime committed is to 'punish' the offender in a way which is in correlation to the crime committed. However, there are evidently fundamental flaws to such a system; prisons are often described as 'universities of crime', whereby people who get sent there as part of their punishment, mix with other criminals and once released are highly likely to re-offend. The evidence for whether
Prison Term Policy: Deterrence Of The Crime Rate
The longer sentence will only anger criminals and make them commit the same crime again. I feel that the focus of study should be on a well planned out rehabilitation program for inmates. Studies show that rehab is the best way to change the crime rate of armed robbery is to talk to the inmates and to figure out what the source of the issue is. Building a relationship with the inmates will allow them to feel like someone cares and they are human. They will feel understood and that they have someone to talk
Gun Control Arguments
However, they support strict laws against gun-related crimes and better enforcement of those laws. On the other hand, those who support gun control are of the opinion that background checks are necessary to keep arms out of reach from the convicted and the mentally ill. Americans can lie somewhere between the two points of view. The Case for
The Controversy Over The Death Penalty
Many supporters of the death penalty argue that it will deter violent crime. People of this opinion believe that speeding up the death penalty process murderers would think twice before killing, because they fear death. This idea has been shown to be entirely false. Besides, if a crime is premeditated possible criminals do not think about the penalty of death but they often think of ways to elude arrest and conviction not the fear of punishment. In fact, it has been shown that murder rates are higher in states that issue the death penalty than states with those with no form of capital punishment (Death Penalty Information).
Policy Process Paper On The Criminal Justice System
Policy Process Paper The public counts on the criminal justice system to keep them safe from harm and to maintain order in our society. The criminal justice system is expected to separate the guilty from the innocent and to meet the basic aims of our laws. It must meet the need to put the truly dangerous individuals out of action. The criminal justice system is expected to promote retribution and deterrence for criminals. The public "expect the criminal justice system and criminal law to be fair" (American Bar Association, n.d., para.1) in their punishment and judgment of those accused of crimes.
Persuasive Essay: The Death Penalty In California
In order for this to take place people need to consider the crimes those criminals have been charge with and have been found innocent and still commit the same charges as the first time. Therefore execution is best way to punish someone by doing it out of justice and not just because people are angry and mad. The death penalty is not a big
More about Prison Term Policy Research Paper | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 3,540 | [
128000,
3617,
3416,
17978,
11216,
8483,
18343,
198,
3617,
3416,
17978,
11216,
97631,
356,
45280,
14,
15726,
6250,
220,
777,
11,
220,
679,
16,
99764,
36367,
1543,
13822,
1666,
264,
1589,
61334,
16549,
323,
4423,
889,
4375,
439,
459,
37713,
311,
264,
4562,
315,
279,
1614,
39856,
430,
690,
5246,
3412,
264,
7055,
389,
264,
4121,
430,
690,
8417,
3508,
477,
539,
279,
7340,
9527,
4751,
369,
904,
1732,
889,
374,
23959,
315,
17903,
44214,
1288,
387,
35717,
358,
690,
656,
856,
1888,
311,
3041,
459,
9647,
660,
1684,
389,
420,
3917,
430,
690,
387,
12190,
3403,
369,
279,
1732,
311,
8884,
358,
1097,
63779,
311,
1304,
264,
4367,
5597,
13,
3092,
13697,
31869,
430,
279,
4121,
1694,
9277,
1603,
603,
374,
832,
430,
374,
17235,
5526,
719
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
3617,
3416,
17978,
11216,
8483,
18343,
198,
3617,
3416,
17978,
11216,
97631,
356,
45280,
14,
15726,
6250,
220,
777,
11,
220,
679,
16,
99764,
36367,
1543,
13822,
1666,
264,
1589,
61334,
16549,
323,
4423,
889,
4375,
439,
459,
37713,
311,
264,
4562,
315,
279,
1614,
39856,
430,
690,
5246,
3412,
264,
7055,
389,
264,
4121,
430,
690,
8417,
3508,
477,
539,
279,
7340,
9527,
4751,
369,
904,
1732,
889,
374,
23959,
315,
17903,
44214,
1288,
387,
35717,
358,
690,
656,
856,
1888,
311,
3041,
459,
9647,
660,
1684,
389,
420,
3917,
430,
690,
387,
12190,
3403,
369,
279,
1732,
311,
8884,
358,
1097,
63779,
311,
1304,
264,
4367,
5597,
13,
3092,
13697,
31869,
430,
279,
4121,
1694,
9277,
1603,
603,
374,
832,
430,
374,
17235,
5526,
719,
-100
] |
The handful of Marines who share their stories from Iraq and Afghanistan are haunted by what they saw and participated in. For one veteran of the Baghdad invasion, torment over the deaths of Iraqi civilians leads him to seek out their surviving relatives. Another, suffering from survivor's guilt, recalls watching a friend burn to death. Lives turn inward; marriages falter.
The compulsory extension of tours of duty has exposed contemporary soldiers to unprecedented levels of combat, but the film shows too that mental health problems for returning troops are nothing new. With a snippet from John Huston's long-suppressed 1946 documentary "Let There Be Light," Donahue nods to a short-lived psychiatric treatment program for returning World War II soldiers, one that attempted to break through the stigma against seeking help.
The film argues for a dedicated Behavioral Health Corps for the armed forces, and highlights private programs whose healing solutions aren't based on prescription pads. With the same clarity and fluency he brought to far sunnier material in "Casting By," Donahue pinpoints the devastating intersection of personal trauma and institutional neglect in an age of perpetual war. | {
"redpajama_set_name": "RedPajamaC4"
} | 4,265 | [
128000,
791,
23810,
315,
51889,
889,
4430,
872,
7493,
505,
11340,
323,
21139,
527,
57775,
555,
1148,
814,
5602,
323,
31408,
304,
13,
1789,
832,
21487,
315,
279,
56318,
30215,
11,
73770,
927,
279,
16779,
315,
31334,
29536,
11767,
1461,
311,
6056,
704,
872,
40746,
29658,
13,
13596,
11,
16066,
505,
49748,
596,
34951,
11,
41231,
10307,
264,
4333,
8395,
311,
4648,
13,
40495,
2543,
63018,
26,
47451,
26564,
466,
627,
791,
65868,
9070,
315,
31261,
315,
14523,
706,
15246,
19225,
15201,
311,
31069,
5990,
315,
12896,
11,
719,
279,
4632,
5039,
2288,
430,
10723,
2890,
5435,
369,
13758,
17312,
527,
4400,
502,
13,
3161,
264,
44165,
505,
3842,
86550,
263,
596,
1317,
59615,
14655,
220,
6393,
21,
25999,
330,
10267,
2684,
2893,
8828,
1359,
4418,
1494,
361
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
791,
23810,
315,
51889,
889,
4430,
872,
7493,
505,
11340,
323,
21139,
527,
57775,
555,
1148,
814,
5602,
323,
31408,
304,
13,
1789,
832,
21487,
315,
279,
56318,
30215,
11,
73770,
927,
279,
16779,
315,
31334,
29536,
11767,
1461,
311,
6056,
704,
872,
40746,
29658,
13,
13596,
11,
16066,
505,
49748,
596,
34951,
11,
41231,
10307,
264,
4333,
8395,
311,
4648,
13,
40495,
2543,
63018,
26,
47451,
26564,
466,
627,
791,
65868,
9070,
315,
31261,
315,
14523,
706,
15246,
19225,
15201,
311,
31069,
5990,
315,
12896,
11,
719,
279,
4632,
5039,
2288,
430,
10723,
2890,
5435,
369,
13758,
17312,
527,
4400,
502,
13,
3161,
264,
44165,
505,
3842,
86550,
263,
596,
1317,
59615,
14655,
220,
6393,
21,
25999,
330,
10267,
2684,
2893,
8828,
1359,
4418,
1494,
361,
-100
] |
Works to remove the dangerous and congested level crossing at Aviation Road in Laverton will start later this year, thanks to the Andrews Labor Government. The final design and contract has been awarded to remove the Aviation Road level crossing which will deliver a vital..
A re-elected Andrews Government will embark upon the biggest transformation of public transport in Australia's history, with a new underground rail network set to circle Melbourne's suburbs and connect every major train line from the Frankston line to the Werribee line through Melbourne Airport.
The Andrews Labor Government is helping to get new community playgroups off the ground, giving families in the Altona District more access to valuable support.
Victorian carers will be able to get the practical support they need with a re-elected Andrews Labor Government to increase respite care hours and support services for carers.
Altona Youth Club Calisthenics and Point Cook Football Club will be better prepared to manage a medical emergency on and off the park after receiving a defibrillator and training package from the Andrews Labor Government.
Students in Point Cook will soon have the modern classrooms and school facilities they need to get the great education they deserve, thanks to the Andrews Labor Government.
Train services along the Altona Loop will resume tomorrow as the planned 43-day construction blitz to remove another level crossing and build new track finishes almost a week ahead of schedule.
The Andrews Labor Government's preferred route for the Melbourne Airport Rail Link will ensure Werribee passengers can get to the airport safer and sooner.
Minister for Energy, Environment and Climate Change Lily D'Ambrosio and Member for Altona District Jill Hennessy visited Altona Primary to meet with a recipient of a grant from the Fund, Beach Patrol Australia, which received funding for its 'Help Save Sam the Seadragon' project.
Road work is ramping up in the western suburbs as part of the Andrews Labor Government's Suburban Roads Upgrade, the biggest ever investment in Melbourne's arterial road network. Key upgrades are getting underway on Leakes Road, Derrimut Road and Dunnings and Palmers Roads to slash..
The Andrews Labor Government will invest $2.4 million to boost access and participation in the state's booming startup sector, with a focus on regional Victorian communities. The funding will be invested through LaunchVic and will support 15 projects across 26 local government areas in Victoria.. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,351 | [
128000,
38783,
311,
4148,
279,
11660,
323,
44385,
291,
2237,
27736,
520,
50047,
9728,
304,
43950,
37733,
690,
1212,
3010,
420,
1060,
11,
9523,
311,
279,
52951,
15277,
10423,
13,
578,
1620,
2955,
323,
5226,
706,
1027,
22034,
311,
4148,
279,
50047,
9728,
2237,
27736,
902,
690,
6493,
264,
16595,
35047,
32,
312,
96805,
52951,
10423,
690,
70531,
5304,
279,
8706,
18475,
315,
586,
7710,
304,
8494,
596,
3925,
11,
449,
264,
502,
26326,
13881,
4009,
743,
311,
12960,
27535,
596,
48013,
323,
4667,
1475,
3682,
5542,
1584,
505,
279,
9454,
7876,
1584,
311,
279,
36880,
462,
33131,
1584,
1555,
27535,
21348,
627,
791,
52951,
15277,
10423,
374,
10695,
311,
636,
502,
4029,
1514,
17171,
1022,
279,
5015,
11,
7231,
8689,
304,
279,
1708,
783,
64,
11182,
810
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
38783,
311,
4148,
279,
11660,
323,
44385,
291,
2237,
27736,
520,
50047,
9728,
304,
43950,
37733,
690,
1212,
3010,
420,
1060,
11,
9523,
311,
279,
52951,
15277,
10423,
13,
578,
1620,
2955,
323,
5226,
706,
1027,
22034,
311,
4148,
279,
50047,
9728,
2237,
27736,
902,
690,
6493,
264,
16595,
35047,
32,
312,
96805,
52951,
10423,
690,
70531,
5304,
279,
8706,
18475,
315,
586,
7710,
304,
8494,
596,
3925,
11,
449,
264,
502,
26326,
13881,
4009,
743,
311,
12960,
27535,
596,
48013,
323,
4667,
1475,
3682,
5542,
1584,
505,
279,
9454,
7876,
1584,
311,
279,
36880,
462,
33131,
1584,
1555,
27535,
21348,
627,
791,
52951,
15277,
10423,
374,
10695,
311,
636,
502,
4029,
1514,
17171,
1022,
279,
5015,
11,
7231,
8689,
304,
279,
1708,
783,
64,
11182,
810,
-100
] |
Mirror News
Home » Mirror News » Mirror News - Volume 41 - Issue 5 - November 16, 2015
Detroit's Techno Roots Live
Kelly Pettit
Photo by Jeliet Degain
When hearing the term "electronic dance music," what is the first thing that comes to mind? For some, it may be the most popular DJs or electronic musicians of today, such as Bassnectar, Skrillex, Daft Punk, and Deadmau5. Others might think of nightclubs or raves with intense music, wild people, and tons of glow sticks and florescent lights. Most people probably don't think of the Motor City. What many people don't realize, though, is that the genre of electronic music, or techno, was invented right in our own backyard — in the city of Detroit. In the late 80s and early 90s, when the city was starting to work on changing its image, young Detroiters aspired to create positivity within the negative atmosphere. Musicians Juan Atkins, Kevin Saunderson, and Derrick May are three of them — the Belleville Three to be exact. These men, along with several others, created what is known as Detroit techno. The idea behind this invention was to create music that mimicked the industrial sound of Detroit — music that was unlike anything anybody had ever heard before. At the same time, these musicians wanted to create music that defined the city. The minimalistic, repetitive, futuristic sound combined with a machine-like atmosphere directly mirrored the spirit of the post-industrial city. These musicians strived to keep the soul of Detroit alive while also attempting to promote new, futuristic concepts by translating human ideas using synthesizing machinery. Detroit techno was not just another genre of music, but a reproduction of the city itself.
Over the years, the genre of Detroit techno has transformed into many different genres and sub-genres. From the soft, trance-like music of Tropical House, to Heavy Trap which is filled with intense rhythms and heavy bass-drops, Techno provides a variety of styles. Whether you choose to listen to techno, house, ambient, jungle, downtempo, dupstep, trap, or any others, it is nearly impossible not to move your body to the sensory-stimulating sounds. If you enjoy the softer side of Electronic Dance Music (EDM), artists such as Kygo or Klingande may strike your interest. If you are a fan of the heavy, more energized forms of EDM, Flosstradamus, Excision, and Big Gigantic might fit your style better. There are many local Detroit artists within the electronic genre, such as Gosh Pith, a cosmic trap duo, and Jamaican Queens, an electronic pop group. There are even artists that incorporate jazz and funk sounds into their music, like the popular Detroit producer, GRiZ.
The city of Detroit provides a variety of places and opportunities for people to get their fill of all types of electronic music. Aside from the Movement Festival held in the city every Memorial Day weekend, Detroit has many concert halls, cafes, bars, and other venues where DJs and musicians perform every week, including Majestic Cafe, Populux, The Fillmore, The Masonic Temple, and The Works Nightclub.
One of the Belleville Three, Kevin Saunderson, is even performing at The Annex in Detroit on November 25! Even if you are unsure about electronic music, there is no harm in checking out its different styles or the various venues where it can be found. You may even gain a new appreciation for the genre and the city itself!
For more information on electronic music events happening weekly, you can checkout http://www.detroittechnohouse.com.
Issue Info
Volume 41 - Issue 5
The Mirror News circulates to thousands of students and staff.
www.facebook.com/lawrencetechu
Do you think there should be armed security on campus?
WHFR Radio
HFC observes Dr. Martin Luther King, Jr. Day with community service
Ex-Airborne Ranger returns to HFC to finish degree after 37 years
Long-time HFC employee and alumnus becomes Director of Facilities
Students: apply now for Social Venture Challenge competition; deadline is Jan. 30!
Copyright ©2020 Henry Ford College All rights reserved.
5101 Evergreen Rd. Dearborn, MI 48128
[email protected] | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 7,640 | [
128000,
55316,
5513,
198,
7778,
8345,
34954,
5513,
8345,
34954,
5513,
482,
20880,
220,
3174,
482,
26292,
220,
20,
482,
6841,
220,
845,
11,
220,
679,
20,
198,
98393,
596,
7146,
78,
75687,
11406,
198,
70172,
83596,
275,
198,
10682,
555,
622,
301,
3978,
58337,
467,
198,
4599,
11011,
279,
4751,
330,
19493,
8535,
15612,
4731,
1359,
1148,
374,
279,
1176,
3245,
430,
4131,
311,
4059,
30,
1789,
1063,
11,
433,
1253,
387,
279,
1455,
5526,
93627,
477,
14683,
32629,
315,
3432,
11,
1778,
439,
37053,
2375,
277,
11,
4923,
31660,
2635,
11,
14569,
728,
52433,
11,
323,
15371,
1764,
84,
20,
13,
26080,
2643,
1781,
315,
3814,
77385,
477,
436,
4798,
449,
19428,
4731,
11,
8545,
1274,
11,
323,
20181,
315,
37066,
34240,
323,
9943,
417,
1189
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
55316,
5513,
198,
7778,
8345,
34954,
5513,
8345,
34954,
5513,
482,
20880,
220,
3174,
482,
26292,
220,
20,
482,
6841,
220,
845,
11,
220,
679,
20,
198,
98393,
596,
7146,
78,
75687,
11406,
198,
70172,
83596,
275,
198,
10682,
555,
622,
301,
3978,
58337,
467,
198,
4599,
11011,
279,
4751,
330,
19493,
8535,
15612,
4731,
1359,
1148,
374,
279,
1176,
3245,
430,
4131,
311,
4059,
30,
1789,
1063,
11,
433,
1253,
387,
279,
1455,
5526,
93627,
477,
14683,
32629,
315,
3432,
11,
1778,
439,
37053,
2375,
277,
11,
4923,
31660,
2635,
11,
14569,
728,
52433,
11,
323,
15371,
1764,
84,
20,
13,
26080,
2643,
1781,
315,
3814,
77385,
477,
436,
4798,
449,
19428,
4731,
11,
8545,
1274,
11,
323,
20181,
315,
37066,
34240,
323,
9943,
417,
1189,
-100
] |
New Week: Monday 19th January!
Round Closes: Monday 26th January!
With this round, UMN will become biweekly. So there's two weeks to answer this round.
This round is worth six cards in total! Answer all five questions correctly to earn this week's bonus: two random character cards!
This round closes on Tuesday, 20th January to get into the biweekly routine!
It's a new week, so come by and keep switching!
New Week: Monday 5th December!
Rolling Down the UMN 34 - Holiday Special!
This round is worth sixteen cards in total! Answer everything correctly to earn the bonus: four extra random cards and two crayons. That means you can earn a whopping 20 cards and two crayons in total!
This round closes on Tuesday, 6th January, 2015.
Switch It Up 89.5 - Holiday Week!
It's halfway through Switch It Up 89 and the Princesses have a holiday surprise for you!
This week there's only one pile, and your four switches you can offer any card for the four you're requesting, regardless of colour, number, or how many are already in the pile of that deck!
This round is worth six cards in total! Answer all five questions correctly to earn this week's bonus: one random crayon!
This round closes on Tuesday, 23rd December. CLOSED.
New Week: Monday 22nd December!
DAY 13: Favourite Colors Things!
Now that we're halfway through the advent event, it's time to sit back and appreciate everything Colors has given us. Tell me about your favourite things from Colors! It can be a favourite deck you wish you could master ten times over, or a much-loved game that you always play, or a special member or mod - anything! Got a favourite card? Do you jump for joy at Recycled Art, or count down the days until the Monthly Release?
You can tell me about as many of your favourite things as you want, but as long as you talk about at least one, you'll be rewarded with two random character cards and one choice 13 card! Don't wait for me to reply to claim your choice 13 card, but please write in your comment what you're taking.
Ahhhhhaha guess who announced New Switch It Up week on Plurk but never actually posted the banner?
It's a new week, so your offer slots have reset. Come on by and keep switching with the Princesses!
Round ends: Monday 15th December!
DAY 9: Vacations and Travelling!
Let's think about a change of scenery! Tell me your thoughts on on travelling and vacations - is there somewhere you've always wanted to visit but never had the chance? Where have you been before, or do you prefer to stay at home? Maybe there's a vacation you'd never take again in a million years, or perhaps travelling at Christmas is second nature to you. Tell me about your thoughts on vacations/travelling.
Answering this will be rewarded with two random cards and a random crayon!
This round is worth seven cards in total! Answer all five questions correctly to earn this week's bonus: two extra random cards!
This round closes on Tuesday, 16th December. CLOSED.
DAY 5: Best Christmas Memories!
Christmas is well on its way, and some of us will be busy preparing for another happy holiday! Today, tell me about your best Christmas-related memories! Do you have a Christmas from the past that is hard to beat? Or a best gift given or received, or a funny story to share? Whatever it is, I want to know about your favourite Christmas memories!
Answering this will be rewarded with three random character cards.
This round is worth five cards in total!
This round closes on Tuesday, 9th December. ROUND CLOSED.
New Week: Monday 8th December!
This round is worth six cards in total! Answer all five questions correctly to earn this week's bonus: one random special card!
Round ends: Monday 1st December.
This round is worth five cards in total! Answer all five questions correctly to earn this week's bonus: two extra random cards!
This round closes on Tuesday, 25th November. ROUND CLOSED.
New Week: Monday 24th November! | {
"redpajama_set_name": "RedPajamaC4"
} | 742 | [
128000,
3648,
10563,
25,
7159,
220,
777,
339,
6186,
4999,
28597,
356,
50441,
25,
7159,
220,
1627,
339,
6186,
4999,
2409,
420,
4883,
11,
549,
56281,
690,
3719,
6160,
72867,
13,
2100,
1070,
596,
1403,
5672,
311,
4320,
420,
4883,
627,
2028,
4883,
374,
5922,
4848,
7563,
304,
2860,
0,
22559,
682,
4330,
4860,
12722,
311,
7380,
420,
2046,
596,
12306,
25,
1403,
4288,
3752,
7563,
4999,
2028,
4883,
34350,
389,
7742,
11,
220,
508,
339,
6186,
311,
636,
1139,
279,
6160,
72867,
14348,
4999,
2181,
596,
264,
502,
2046,
11,
779,
2586,
555,
323,
2567,
28865,
4999,
3648,
10563,
25,
7159,
220,
20,
339,
6790,
4999,
33455,
287,
6419,
279,
549,
56281,
220,
1958,
482,
32769,
9984,
4999,
2028,
4883,
374,
5922,
59139,
7563,
304,
2860,
0
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
3648,
10563,
25,
7159,
220,
777,
339,
6186,
4999,
28597,
356,
50441,
25,
7159,
220,
1627,
339,
6186,
4999,
2409,
420,
4883,
11,
549,
56281,
690,
3719,
6160,
72867,
13,
2100,
1070,
596,
1403,
5672,
311,
4320,
420,
4883,
627,
2028,
4883,
374,
5922,
4848,
7563,
304,
2860,
0,
22559,
682,
4330,
4860,
12722,
311,
7380,
420,
2046,
596,
12306,
25,
1403,
4288,
3752,
7563,
4999,
2028,
4883,
34350,
389,
7742,
11,
220,
508,
339,
6186,
311,
636,
1139,
279,
6160,
72867,
14348,
4999,
2181,
596,
264,
502,
2046,
11,
779,
2586,
555,
323,
2567,
28865,
4999,
3648,
10563,
25,
7159,
220,
20,
339,
6790,
4999,
33455,
287,
6419,
279,
549,
56281,
220,
1958,
482,
32769,
9984,
4999,
2028,
4883,
374,
5922,
59139,
7563,
304,
2860,
0,
-100
] |
Gig Info:
City: San Francisco, CA
Venue: Warfield, The
A Gala Event - Exclusive Instrumental Show
1. Transitions
2. Son of Neckbone
3. Groove Holmes
4. Suco de Tangerina
5. Live at PJ's
6. 14th St. Break
7. Futterman's Rule
8. Remote Control
9. Time for Livin'
10. Pow
11. Lighten Up
12. Root Down and Get It
13. Electric Worm
14. In 3's
15. Egg Raid on Mojo
16. The Gala Event
17. Jimmy James
18. B for My Name
19. Mark on the Bus
20. Shambala
21. Sabrosa
22. Tough Guy
23. Off the Grid
24. Ricky's Theme
25. Do It
26. Heart Attack Man
27. Gratitude
28. So What'cha Want
29. Sure Shot
30. Three MC's and One DJ
31. Sabotage
SF Weekly, August 25, 2007
By Oscar Pascual:
If you don't believe in the ultimate staying power of the Beastie Boys, you are of little faith in anything. "Cool�" never just dies.
Let me elaborate. Considering the past three decades, there really hasn�t been a set of three cooler people on Earth than the B-Boys. Think about it. Their albums embody all that is cool. When Check Your Head came out, everyone had to have flannel and skullcaps. A couple years later, was there anything cooler than "Sabotage?" Don't front like you haven�t dressed up like a mustachio'd undercover cop for Halloween at least a few times since the video came out. Not to mention these dudes were rocking Bathing Ape years before Pharrell. But I digress from my point.
The Beastie Boys are still cool after all these years. As a kid growing up, there was certainly nothing more influential on my impressionable youth than the Beasties, and the same goes for millions, I'd imagine. I honestly do not know what kind of a person I would be today without the coolness of MCA Adam Yauch, Michael Diamond and the King Adrock Adam Horovitz. I found my way through their music, philosophy, social awareness, and all-around flyness. Normally, growing old tends to reverse the cool clock--dudes spitting rhymes with a full head of gray hair should not be cool. But the Beasties remain constant.
My case in point is last night at their self-proclaimed Gala Event at the Warfield, where the Boys and their band exhibited rare form, commanding a rather dapperly dressed audience. The B-Boys immediately got the cool flowing with "Son of Neckbone," a funky little joint from The In Sound From Way Out!, an ancestor to their latest release The Mix-Up. It was a bit off-putting to see the Beasties play the first song with no rhyming, which evidently is scaring a slew of would-be listeners away from the all-instrumental new album. I admit I was a bit apprehensive to hear that the show would be an all-instrumental "Gala Event," but the Beasties soon quelled all doubts when they broke out with "Live at PJ's," giving the crowd Adrock's good ole comical, nasal flow. The Beasties rhymed, all right. They just weren't putting down their instruments for any song.
This meant faithful reproductions of old (grade) school favorites. It marked the first time I've seen three emcees rhyme the rhyme well while simultaneously playing their instruments. The Boys pulled it off effortlessly when performing "Jimmy James" and "Do It." This also meant throwing down hardcore burners like "Time For Living," "Tough Guy," "Heart Attack Man," and even their adolescent punk-era "Egg Raid on Mojo," proving dudes in their 40's rock shit better than the kiddies.
The Beastie Boys exhibited tight musicianship, executing their ill beats flawlessly--Mike D kept time masterfully, Adrock kept the Mayfield-esque wahwah going, and Yauch kept the sound fat with his distorted basslines--all with the help of Money Mark Nishita's sweet keys, hometown favorite Mix Master Mike's deliberate cuts, and Alfredo Ortiz's booming rhythm. They then capped the night off with an encore of what one could argue are the three coolest songs ever--"Sure Shot," "3 MC's and One DJ," and the immortal "Sabotage."
It would have been simply mortifying to see my childhood heroes actually act their age, but once again, cool doesn't die. Just look at The Simpsons, big-budget movie explosions, and the Beastie Boys. Cool. Fucking cool.
� MMIX Beastiemania.com. Copyright Statement. Click HERE to contact us. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 7,764 | [
128000,
38,
343,
13374,
512,
13020,
25,
5960,
13175,
11,
9362,
198,
91236,
25,
5111,
2630,
11,
578,
198,
32,
76541,
3749,
482,
49380,
43405,
278,
7073,
198,
16,
13,
4149,
6055,
198,
17,
13,
12103,
315,
44055,
20337,
198,
18,
13,
18370,
1009,
40401,
198,
19,
13,
17360,
1030,
409,
350,
4091,
2259,
198,
20,
13,
11406,
520,
66080,
596,
198,
21,
13,
220,
975,
339,
800,
13,
15996,
198,
22,
13,
435,
6339,
1543,
596,
18592,
198,
23,
13,
21400,
7935,
198,
24,
13,
4212,
369,
37311,
258,
1270,
605,
13,
24523,
198,
806,
13,
8828,
268,
3216,
198,
717,
13,
19385,
6419,
323,
2175,
1102,
198,
1032,
13,
21246,
74130,
198,
975,
13,
763,
220,
18,
596,
198,
868,
13,
42313,
33800,
389,
96749,
198
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
38,
343,
13374,
512,
13020,
25,
5960,
13175,
11,
9362,
198,
91236,
25,
5111,
2630,
11,
578,
198,
32,
76541,
3749,
482,
49380,
43405,
278,
7073,
198,
16,
13,
4149,
6055,
198,
17,
13,
12103,
315,
44055,
20337,
198,
18,
13,
18370,
1009,
40401,
198,
19,
13,
17360,
1030,
409,
350,
4091,
2259,
198,
20,
13,
11406,
520,
66080,
596,
198,
21,
13,
220,
975,
339,
800,
13,
15996,
198,
22,
13,
435,
6339,
1543,
596,
18592,
198,
23,
13,
21400,
7935,
198,
24,
13,
4212,
369,
37311,
258,
1270,
605,
13,
24523,
198,
806,
13,
8828,
268,
3216,
198,
717,
13,
19385,
6419,
323,
2175,
1102,
198,
1032,
13,
21246,
74130,
198,
975,
13,
763,
220,
18,
596,
198,
868,
13,
42313,
33800,
389,
96749,
198,
-100
] |
Novofex strategy services provide customized, digital solutions focused on your growth in your industry.
Our Digital Strategy provides an action plan to successful online performance.
We create, launch and grow compelling brands.
Our creatives help you tell a story, generate awareness, and build loyalty relationships with your customers.
We evaluate your digital presence; consider your competitors and industry trends, and conduct research to inform you with a deliverable plan for growth.
We help build brands, rejuvenate existing brands, and work through refreshing strategies and platforms that focus on telling your story, evoking your presence, and maximizing what you mean to your customer's and industry.
It all starts with the blueprint. Novofex team of IA and UI/UX specialists build a plan for high-performance websites we don't just build websites we build platforms. From wireframes, site-maps and user-flows we got you covered.
Expose your brand and execute your strategy. Our creatives give direction to advertising, media, and marketing, by focusing on swift coordination of these in your online campaign strategies.
Every year there's an increase in the amount of systems, tools, and paths for building a successful online business. The Novofex approach to your business is to help you find the best, most cost-effective route for designing and developing your website through our team's experienced insight from working with the latest technology from open source to the best third party platforms available in the market. Our approach is to find to create the ideal platform and combination of tools that will serve your specific needs.
How does brand influence my business?
In the noisy world we live in never before have we had as customers choices. Branding your business is crucial for the life of your business and it's appeal to your target market. We understand the difficult process this can be from the creative conception portion all the way to the execution and broadcast of a campaign. Our Creative Strategists can help define, name, and communicate your brand in away that your target audience can identify with your message and the story your brand tells about your product and service and the culture behind it.
How should I market my website?
The focus of our approach is not to just drive visitors to your website, but to drive qualified traffic that can increase sales or conversions. Our consultants and online marketing strategists are experienced in making out blueprints to online success. We understand the difference among industries, consumers, and available marketing budgets. Depending on the nature of your business, there are several forms of online marketing media that could be efficiently drive traffic to your website. we help you find the right one for you.
What about mobile for my business?
As mobile device usage continues to grow and prevail in our daily device usage, a mobile presence is significant more and more important to gain an edge in the marketplace.In order to provide the best experience for smartphone and tablet users, online businesses should work towards creating a mobile application, mobile website, or responsive website. we help you evaluate both your market, website, and budgets to ensure we can put together an approach that makes sense. Mobile adoption will continue to grow and ensuring an efficient mobile experience to access your business and information will significantly impact how users feel about your brand and business.
We would love to hear from and see how to best help you. Feel free to stop by, give us a call, or drop us a message.
Simply drop us a message and we'll be in touch with you right away!
Feel free to stop by, give us a call, or drop us a message. | {
"redpajama_set_name": "RedPajamaC4"
} | 3,284 | [
128000,
19480,
1073,
327,
8446,
3600,
3493,
32789,
11,
7528,
10105,
10968,
389,
701,
6650,
304,
701,
5064,
627,
8140,
14434,
28845,
5825,
459,
1957,
3197,
311,
6992,
2930,
5178,
627,
1687,
1893,
11,
7195,
323,
3139,
29722,
16097,
627,
8140,
6184,
1924,
1520,
499,
3371,
264,
3446,
11,
7068,
17985,
11,
323,
1977,
32883,
12135,
449,
701,
6444,
627,
1687,
15806,
701,
7528,
9546,
26,
2980,
701,
28650,
323,
5064,
18845,
11,
323,
6929,
3495,
311,
6179,
499,
449,
264,
6493,
481,
3197,
369,
6650,
627,
1687,
1520,
1977,
16097,
11,
73484,
349,
6484,
16097,
11,
323,
990,
1555,
37018,
15174,
323,
15771,
430,
5357,
389,
11890,
701,
3446,
11,
3721,
10979,
701,
9546,
11,
323,
88278,
1148,
499,
3152,
311,
701,
6130,
596,
323,
5064,
627
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
19480,
1073,
327,
8446,
3600,
3493,
32789,
11,
7528,
10105,
10968,
389,
701,
6650,
304,
701,
5064,
627,
8140,
14434,
28845,
5825,
459,
1957,
3197,
311,
6992,
2930,
5178,
627,
1687,
1893,
11,
7195,
323,
3139,
29722,
16097,
627,
8140,
6184,
1924,
1520,
499,
3371,
264,
3446,
11,
7068,
17985,
11,
323,
1977,
32883,
12135,
449,
701,
6444,
627,
1687,
15806,
701,
7528,
9546,
26,
2980,
701,
28650,
323,
5064,
18845,
11,
323,
6929,
3495,
311,
6179,
499,
449,
264,
6493,
481,
3197,
369,
6650,
627,
1687,
1520,
1977,
16097,
11,
73484,
349,
6484,
16097,
11,
323,
990,
1555,
37018,
15174,
323,
15771,
430,
5357,
389,
11890,
701,
3446,
11,
3721,
10979,
701,
9546,
11,
323,
88278,
1148,
499,
3152,
311,
701,
6130,
596,
323,
5064,
627,
-100
] |
Eat Clean. Read the Labels. Count your Calories. Count your Points. Restrict XYZ. Good Foods. Bad Foods. Organic Foods. Shakes. Supplements. Resets.
Food should not be this hard.
Pelvic Floor Dysfunction it isn't just for Moms: a "coles notes" explanation.
*This Blog post contains content that can be triggering for some readers.
Exercise never came easy to me.
In another life, I was an actor - health and fitness wasn't my jam. I once said that I would develop an eating disorder before I would ever step foot in a gym, which ended up being more true than I thought it would when I said it.
Flash forward and a career in health and fitness is a running gag in my family.
Beginning the healing process after pregnancy loss.
So here it is; messy, rambling and perhaps more like something you would find in a journal… but it's me. And my only wish is that my words may find the right person at the right time, leave an impression, and provide a little food for thought. | {
"redpajama_set_name": "RedPajamaC4"
} | 3,964 | [
128000,
89711,
9785,
13,
4557,
279,
62096,
13,
4605,
701,
84037,
13,
4605,
701,
21387,
13,
42427,
858,
72189,
13,
7839,
40160,
13,
11717,
40160,
13,
44037,
40160,
13,
1443,
2094,
13,
92410,
13,
98097,
627,
27844,
1288,
539,
387,
420,
2653,
627,
94872,
45775,
16990,
88266,
433,
4536,
956,
1120,
369,
84395,
25,
264,
330,
85938,
8554,
1,
16540,
627,
9,
2028,
14496,
1772,
5727,
2262,
430,
649,
387,
52605,
369,
1063,
13016,
627,
53809,
2646,
3782,
4228,
311,
757,
627,
644,
2500,
2324,
11,
358,
574,
459,
12360,
482,
2890,
323,
17479,
5828,
956,
856,
20673,
13,
358,
3131,
1071,
430,
358,
1053,
2274,
459,
12459,
19823,
1603,
358,
1053,
3596,
3094,
4579,
304,
264,
19343,
11,
902,
9670,
709,
1694,
810,
837,
1109,
358,
3463
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
89711,
9785,
13,
4557,
279,
62096,
13,
4605,
701,
84037,
13,
4605,
701,
21387,
13,
42427,
858,
72189,
13,
7839,
40160,
13,
11717,
40160,
13,
44037,
40160,
13,
1443,
2094,
13,
92410,
13,
98097,
627,
27844,
1288,
539,
387,
420,
2653,
627,
94872,
45775,
16990,
88266,
433,
4536,
956,
1120,
369,
84395,
25,
264,
330,
85938,
8554,
1,
16540,
627,
9,
2028,
14496,
1772,
5727,
2262,
430,
649,
387,
52605,
369,
1063,
13016,
627,
53809,
2646,
3782,
4228,
311,
757,
627,
644,
2500,
2324,
11,
358,
574,
459,
12360,
482,
2890,
323,
17479,
5828,
956,
856,
20673,
13,
358,
3131,
1071,
430,
358,
1053,
2274,
459,
12459,
19823,
1603,
358,
1053,
3596,
3094,
4579,
304,
264,
19343,
11,
902,
9670,
709,
1694,
810,
837,
1109,
358,
3463,
-100
] |
A practical 40th birthday gift for a home chef or BBQ enthusiast. This apron is perfect for baking, cooking, grilling, and barbecuing. Don't forget aprons are also great gifts for crafters, gardeners, and painters. Material: Made of super soft, silk-like cotton that is durable and lightweight. Who needs the extra heat while cooking? Size: Apron measures 24" wide by 29" long and features an adjustable neck strap to meet your comfort level. No more guessing at sizes -- this apron will comfortably fit up to 66" waist. Features: 2 front pockets measure 5" wide by 6" long each and are great for holding recipe cards, grilling spices, a meat thermometer, and even a cell phone. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,620 | [
128000,
32,
15325,
220,
1272,
339,
15553,
8352,
369,
264,
2162,
30806,
477,
46377,
61912,
13,
1115,
21726,
263,
374,
4832,
369,
28915,
11,
17677,
11,
1099,
9585,
11,
323,
3703,
17106,
7623,
13,
4418,
956,
10894,
21726,
2439,
527,
1101,
2294,
21258,
369,
11003,
388,
11,
13863,
388,
11,
323,
97953,
13,
10441,
25,
19332,
315,
2307,
8579,
11,
41044,
12970,
24428,
430,
374,
27220,
323,
30244,
13,
10699,
3966,
279,
5066,
8798,
1418,
17677,
30,
8645,
25,
5186,
263,
11193,
220,
1187,
1,
7029,
555,
220,
1682,
1,
1317,
323,
4519,
459,
37030,
13272,
34647,
311,
3449,
701,
6981,
2237,
13,
2360,
810,
47576,
520,
12562,
1198,
420,
21726,
263,
690,
45769,
5052,
709,
311,
220,
2287,
1,
29142,
13,
20289,
25,
220,
17,
4156,
30278
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
32,
15325,
220,
1272,
339,
15553,
8352,
369,
264,
2162,
30806,
477,
46377,
61912,
13,
1115,
21726,
263,
374,
4832,
369,
28915,
11,
17677,
11,
1099,
9585,
11,
323,
3703,
17106,
7623,
13,
4418,
956,
10894,
21726,
2439,
527,
1101,
2294,
21258,
369,
11003,
388,
11,
13863,
388,
11,
323,
97953,
13,
10441,
25,
19332,
315,
2307,
8579,
11,
41044,
12970,
24428,
430,
374,
27220,
323,
30244,
13,
10699,
3966,
279,
5066,
8798,
1418,
17677,
30,
8645,
25,
5186,
263,
11193,
220,
1187,
1,
7029,
555,
220,
1682,
1,
1317,
323,
4519,
459,
37030,
13272,
34647,
311,
3449,
701,
6981,
2237,
13,
2360,
810,
47576,
520,
12562,
1198,
420,
21726,
263,
690,
45769,
5052,
709,
311,
220,
2287,
1,
29142,
13,
20289,
25,
220,
17,
4156,
30278,
-100
] |
Q: Regex for everything except certain matches I'm trying to create a redirect regex script that will forward the user onto another domain with the path intact, except when the path matches something specific.
i.e.
http://www.a.com/anything/foo/bar -> http:www.b.com/anything/foo/bar
but if the path starts with something special, then don't redirect:
http://www.a.com/special/1/2/3 -> no redirect
My redirect app works like this: I put entries in line by line (this works fine):
"^/(?P<path>[-\w]+)/(?P<foo>[-\w]+)/(?P<bar>[-\w]+)/$","%(path)s/%(bar)s/%(foo)s/"
"^/(?P<path>.*)$","http://www.b.com/%(path)s"
So something like this (doesn't work):
"^/(?P<path>!(special).*)$","http://www.b.com/%(path)s"
A: http://www.a.com/(?!special).* will match anything which starts with http://www.a.com/ but not http://www.a.com/special.
A: You are looking for a negative lookahead:
"^/(?P<path>(?!special/).*)$","http://www.b.com/%(path)s"
The (?!...) syntax means:
(?!...)
Matches if ... doesn't match next. This is a negative lookahead assertion. For example, Isaac (?!Asimov) will match 'Isaac ' only if it's not followed by 'Asimov'.
so the expression matches if the path starts with / but is not followed by special/.
Demo:
>>> import re
>>> re.search(r"^/(?P<path>(?!special/).*)$", '/special/path') is None
True
>>> re.search(r"^/(?P<path>(?!special/).*)$", '/not-so-special/path').groupdict()
{'path': 'not-so-special/path'}
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 4,448 | [
128000,
48,
25,
27238,
369,
4395,
3734,
3738,
9248,
358,
2846,
4560,
311,
1893,
264,
6559,
20791,
5429,
430,
690,
4741,
279,
1217,
8800,
2500,
8106,
449,
279,
1853,
35539,
11,
3734,
994,
279,
1853,
9248,
2555,
3230,
627,
72,
1770,
627,
1277,
1129,
2185,
5973,
916,
14,
73254,
61655,
50613,
1492,
1795,
25,
2185,
960,
916,
14,
73254,
61655,
50613,
198,
8248,
422,
279,
1853,
8638,
449,
2555,
3361,
11,
1243,
1541,
956,
6559,
512,
1277,
1129,
2185,
5973,
916,
2754,
3037,
14,
16,
14,
17,
14,
18,
1492,
912,
6559,
198,
5159,
6559,
917,
4375,
1093,
420,
25,
358,
2231,
10925,
304,
1584,
555,
1584,
320,
576,
4375,
7060,
997,
87590,
54880,
47,
90311,
29,
7764,
59,
86,
7727,
25239,
30,
47,
27,
8134,
29,
7764
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48,
25,
27238,
369,
4395,
3734,
3738,
9248,
358,
2846,
4560,
311,
1893,
264,
6559,
20791,
5429,
430,
690,
4741,
279,
1217,
8800,
2500,
8106,
449,
279,
1853,
35539,
11,
3734,
994,
279,
1853,
9248,
2555,
3230,
627,
72,
1770,
627,
1277,
1129,
2185,
5973,
916,
14,
73254,
61655,
50613,
1492,
1795,
25,
2185,
960,
916,
14,
73254,
61655,
50613,
198,
8248,
422,
279,
1853,
8638,
449,
2555,
3361,
11,
1243,
1541,
956,
6559,
512,
1277,
1129,
2185,
5973,
916,
2754,
3037,
14,
16,
14,
17,
14,
18,
1492,
912,
6559,
198,
5159,
6559,
917,
4375,
1093,
420,
25,
358,
2231,
10925,
304,
1584,
555,
1584,
320,
576,
4375,
7060,
997,
87590,
54880,
47,
90311,
29,
7764,
59,
86,
7727,
25239,
30,
47,
27,
8134,
29,
7764,
-100
] |
Is the US Suddenly entering a Major new War in Iraq & Syria?
Suddenly, and without almost anyone noticing, the war against ISIS in Syria and Iraq is developing and growing rapidly. Some elements are already clear enough: they include the expansion of ISIS-controlled territory in Libya, the attacks in Paris and California, the increasing involvement of Russia, and the decision of the British parliament to authorise UK air-attacks in Syria.
The first and most immediate follows news of two very recent developments. One is the decision to deploy a "specialized expeditionary targeting force", intended "to ratchet up pressure on the Islamic State by using a small group of special operations troops – possibly fewer than 100 – to more aggressively use intelligence information, to include capturing and killing the group's leaders. In theory this would generate even more and better intelligence, feeding what the military calls a 'virtuous cycle' of intelligence-driven air and ground operations." Such a prospect is remarkably similar to the violent "shadow war" in Iraq from 2004-08, conducted by Task Force 145. It was credited with stemming the insurgency – but also with leading directly to the rise of ISIS.
Ramadi is defended only by 600-1,000 ISIS paramilitaries, yet close to 10,000 Iraqi army personnel and militias have been trying to take the city since August 2015 in an operation originally expected to last a month at most. That it is taking so long is yet one more indication that ISIS is proving to be hugely more resilient than expected, which has led to frequent comments from Pentagon insiders that the movement cannot be defeated without "boots on the ground".
This is the long-anticipated "mission creep", suggested in these columns (and by other analysts) over the past few months (see, for example, "America and Islamic State: mission creeping?", 21 August 2014). Yet even this is not the main story. That concerns very recent information that the entire war is about to take a new and far more complex direction, with a significance that may stretch many years if not decades ahead.
The context here is striking. ISIS has reportedly had 20,000 supporters killed by coalition airstrikes since August 2014 while doubling the number of recruits from other countries from 15,000 to 30,000 (see "ISIS's plan, and the west's trap", 27 November 2015).
Washington's proposal, which is still being developed, will involve the further expansion of four existing bases into "hubs". They include one at Djibouti on the Horn of Africa and another in Iraq (possibly at Erbil in the Kurdish region). Elsewhere in sub-Saharan Africa, the Middle East and southwest Asia, numerous small facilities will either be expanded or started from scratch, with countries such as Ethiopia, Cameroon, Burkino Faso and Niger playing host.
The House of Commons in London voted overwhelmingly on 1 December to expand Britain's involvement in the war in Syria. Perhaps some of those members of parliament may soon start to reflect on just what it is they have agreed to. It may even be that the Labour leader, Jeremy Corbyn's opposition to the war could turn out to be far more prescient than almost anyone yet realises. The precedent of May 2003, when Tony Blair's government believed that the Iraq war would be over in weeks, or at most months, will escape no one. Least of all the fighters and strategists of ISIS. | {
"redpajama_set_name": "RedPajamaC4"
} | 2,963 | [
128000,
3957,
279,
2326,
58801,
16661,
264,
17559,
502,
5111,
304,
11340,
612,
12911,
5380,
98331,
11,
323,
2085,
4661,
5606,
62464,
11,
279,
4208,
2403,
23474,
304,
12911,
323,
11340,
374,
11469,
323,
7982,
19019,
13,
4427,
5540,
527,
2736,
2867,
3403,
25,
814,
2997,
279,
14800,
315,
23474,
41370,
18455,
304,
38059,
11,
279,
8951,
304,
12366,
323,
7188,
11,
279,
7859,
22315,
315,
8524,
11,
323,
279,
5597,
315,
279,
8013,
21814,
311,
3229,
1082,
6560,
3805,
12,
81210,
304,
12911,
627,
791,
1176,
323,
1455,
14247,
11263,
3754,
315,
1403,
1633,
3293,
26006,
13,
3861,
374,
279,
5597,
311,
10739,
264,
330,
15495,
1534,
51264,
661,
25103,
5457,
498,
10825,
330,
998,
436,
85092,
709,
7410,
389,
279,
15558,
3314,
555,
1701,
264,
2678
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
3957,
279,
2326,
58801,
16661,
264,
17559,
502,
5111,
304,
11340,
612,
12911,
5380,
98331,
11,
323,
2085,
4661,
5606,
62464,
11,
279,
4208,
2403,
23474,
304,
12911,
323,
11340,
374,
11469,
323,
7982,
19019,
13,
4427,
5540,
527,
2736,
2867,
3403,
25,
814,
2997,
279,
14800,
315,
23474,
41370,
18455,
304,
38059,
11,
279,
8951,
304,
12366,
323,
7188,
11,
279,
7859,
22315,
315,
8524,
11,
323,
279,
5597,
315,
279,
8013,
21814,
311,
3229,
1082,
6560,
3805,
12,
81210,
304,
12911,
627,
791,
1176,
323,
1455,
14247,
11263,
3754,
315,
1403,
1633,
3293,
26006,
13,
3861,
374,
279,
5597,
311,
10739,
264,
330,
15495,
1534,
51264,
661,
25103,
5457,
498,
10825,
330,
998,
436,
85092,
709,
7410,
389,
279,
15558,
3314,
555,
1701,
264,
2678,
-100
] |
Update on Imagine Scholar Program by Rotary Peace Scholar
Nov 10, 2016 | Education, International Concerns, Non-Profit, Peace
Nick Drushella, who is a newly appointed Rotary Peace Scholar, was born and grew up in Portland, Oregon. In 2012 he graduated from the University of Oregon in International Studies with an emphasis in Media, Journalism and Communications. He has a fierce love for writing, international exploration, but most importantly youth development so it is no surprise he was attracted to the Imagine Scholar program, as its mission aligned with his personal interests.
Like the students say, Imagine Scholar is above all else a family.
Nick spoke to our club about Imagine Scholar earlier this year. You can see more about that here: https://southtownerotary.org/blog/imagine-scholar/
Each year, hundreds of thousands of students enroll to study at South Africa's universities. Of the 60% of black African students who survive, only 15% will ultimately graduate. This is because of an oppressive, ineffective public school system. Most classmates never make it to higher education and those who do come are poorly prepared.
There is a huge racial divide that exists and progress to unify has been very very slow.
The condition of public education in South Africa is akin to a refugee camp.
Imagine Scholar recognizes the enormous unfulfilled potential and talent of South African youth and is building a tremendous network of advocates and activists to address the needs and systemic issues.
As a result, this year, Imagine Scholar youth have been accepted to high quality programs around the globe. They are succeeding in University. They are organizing service projects in their communities.
One example: Rodger awarded a $75,000 scholarship to finish his last two years of college in Armenia at a highly prestigious school.
Another example: Thenjiwe Ndimande is finishing her second year at University of Johannesburg. 10 times out of 10, students like Thenjiwe would have been forgotten because she was not doing well in public schools. But now she is in the top 10% of the 50,000 person class at Johannesburg and working her way to the top 2%. This summer, she came to the US for help fundraising and raising awareness for Imagine Scholar and she is on track to become a program director of Imagine Director by 2020. Many current staff will eventually be replaced by those who have experienced the program and who have grown up in South Africa.
Imagine Scholar looks for students during the 8th grade year and accept 10 students each year out of hundreds of applicants. They come 6 days a week, 20-30 hours a week, to Imagine Scholar in addition to their regular studies, their chores. It's built for students who are committed and want to be there.
Imagine Scholar believes in starting small and nurturing students. It's a sustained investment. Each experience and accomplishment builds on the last.
Please visit the Imagine Scholar website for more information and to get involved. Consider sponsoring a student. You will be able to communicate with your student.
Nick is excited for transitioning from Imagine Scholar to his studies under the Rotary Peace Fellowship in Australia. This will be a 1.5 year masters program. He will focus on the UN's sustainable goal of ensuring inclusive and quality education for all. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 4,246 | [
128000,
4387,
389,
38891,
25542,
6826,
555,
75956,
26888,
25542,
198,
19480,
220,
605,
11,
220,
679,
21,
765,
11930,
11,
7327,
52347,
82,
11,
11842,
58186,
6410,
11,
26888,
198,
31456,
2999,
1136,
6985,
11,
889,
374,
264,
13945,
21489,
75956,
26888,
25542,
11,
574,
9405,
323,
14264,
709,
304,
23947,
11,
19313,
13,
763,
220,
679,
17,
568,
33109,
505,
279,
3907,
315,
19313,
304,
7327,
19241,
449,
459,
25679,
304,
7972,
11,
69653,
323,
26545,
13,
1283,
706,
264,
42442,
3021,
369,
4477,
11,
6625,
27501,
11,
719,
1455,
23659,
12822,
4500,
779,
433,
374,
912,
13051,
568,
574,
29123,
311,
279,
38891,
25542,
2068,
11,
439,
1202,
9131,
27210,
449,
813,
4443,
12034,
627,
13246,
279,
4236,
2019,
11,
38891,
25542,
374,
3485,
682
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
4387,
389,
38891,
25542,
6826,
555,
75956,
26888,
25542,
198,
19480,
220,
605,
11,
220,
679,
21,
765,
11930,
11,
7327,
52347,
82,
11,
11842,
58186,
6410,
11,
26888,
198,
31456,
2999,
1136,
6985,
11,
889,
374,
264,
13945,
21489,
75956,
26888,
25542,
11,
574,
9405,
323,
14264,
709,
304,
23947,
11,
19313,
13,
763,
220,
679,
17,
568,
33109,
505,
279,
3907,
315,
19313,
304,
7327,
19241,
449,
459,
25679,
304,
7972,
11,
69653,
323,
26545,
13,
1283,
706,
264,
42442,
3021,
369,
4477,
11,
6625,
27501,
11,
719,
1455,
23659,
12822,
4500,
779,
433,
374,
912,
13051,
568,
574,
29123,
311,
279,
38891,
25542,
2068,
11,
439,
1202,
9131,
27210,
449,
813,
4443,
12034,
627,
13246,
279,
4236,
2019,
11,
38891,
25542,
374,
3485,
682,
-100
] |
How to Play Flag Football
Contact football is a fun, pickup type of football that numerous youthful school children keep on playing on the jungle gyms of schools around the United States. This type of football couldn't go to a higher degree of rivalry because of the contentions that would result about whether or not a player had been "handled" or brought down by his rival. Because of one of these commotions, a young fellow fostered another wind on the game and banner football appeared. The game has developed to incorporate players from numerous countries. This article presents an essential, widely appealing technique of how to play banner football.
The format of the field and the gear required is characterized in different articles by this writer. Our concentration here is to introduce essential play of the round of banner football.
The object of the game is for each group to propel the football when they are in control of it to their comparing end zones to score a score. The development of the ball is generally done in a progression of plays or "downs" that are counted through zones of twenty yards each. A progression of downs is the point at which the hostile group advances to the following zone. The hostile group has four successive freedoms or "downs" to make that progression. Assuming that they neglect to do as such, they relinquish the ball to the next group who then, at that point, has the chance to progress to their next zone inside four downs.
A few associations have a no contact rule while others have contact. For this article we will talk about the "contact variant" of play. The main genuine type of contact is impeding. To hinder is to discourage the rival by reaching him anyplace between the midsection and neck while the blocker's feet stay in touch with the ground. There is no cross body obstructing or downfield hindering done by the hostile players. It isn't allowable for a player to run ahead of the ball transporter to screen or deter the safeguard from his partner conveying the ball. หวยออนไลน์
General play incorporates running the ball and pass plays. A ball transporter can progress toward his objective line until an adversary pulls one of his banners. By then he is considered down and the ball is set on the field at that position and down is taken out from that group's series of four downs inside that zone. Assuming that the ball transporter can arrive at the following scrimmage zone before his banner is pulled, he will have acquired four additional downs for his group to keep propelling the ball toward the objective line.
The game comprises of double cross periods for a sum of an hour. These double cross periods, or parts, are each partitioned into two equivalent fifteen-minute quarters. The game starts with an opening shot that is a free kick. The chosen guarded crew makes the free kick to the hostile crew of the rival group. Time starts when the ball contacts a player lawfully. Each time a down happens the game clock is halted until the hostile crew snaps the ball once more.
The most ideal way to see how to play banner football is to get a rulebook and concentrate every one of the standards. Then, at that point, watch a game with somebody who knows about ordinary play who can clarify how the game is played while it unfurls before you.
Beware Of Casino Affiliate Scams
How Soccer Statistics Help Improve Your Game
Youth Soccer Forum – Social Place of Sharing Knowledge | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 7,658 | [
128000,
4438,
311,
7199,
23497,
21424,
198,
8906,
9141,
374,
264,
2523,
11,
30686,
955,
315,
9141,
430,
12387,
65655,
2978,
2911,
2567,
389,
5737,
389,
279,
45520,
29720,
1026,
315,
8853,
2212,
279,
3723,
4273,
13,
1115,
955,
315,
9141,
7846,
956,
733,
311,
264,
5190,
8547,
315,
61022,
1606,
315,
279,
2262,
919,
430,
1053,
1121,
922,
3508,
477,
539,
264,
2851,
1047,
1027,
330,
39921,
1,
477,
7263,
1523,
555,
813,
21425,
13,
9393,
315,
832,
315,
1521,
1081,
41356,
11,
264,
3995,
12637,
31087,
291,
2500,
10160,
389,
279,
1847,
323,
24206,
9141,
9922,
13,
578,
1847,
706,
8040,
311,
33435,
4311,
505,
12387,
5961,
13,
1115,
4652,
18911,
459,
7718,
11,
13882,
33352,
15105,
315,
1268,
311,
1514,
24206,
9141,
627,
791,
3645
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
4438,
311,
7199,
23497,
21424,
198,
8906,
9141,
374,
264,
2523,
11,
30686,
955,
315,
9141,
430,
12387,
65655,
2978,
2911,
2567,
389,
5737,
389,
279,
45520,
29720,
1026,
315,
8853,
2212,
279,
3723,
4273,
13,
1115,
955,
315,
9141,
7846,
956,
733,
311,
264,
5190,
8547,
315,
61022,
1606,
315,
279,
2262,
919,
430,
1053,
1121,
922,
3508,
477,
539,
264,
2851,
1047,
1027,
330,
39921,
1,
477,
7263,
1523,
555,
813,
21425,
13,
9393,
315,
832,
315,
1521,
1081,
41356,
11,
264,
3995,
12637,
31087,
291,
2500,
10160,
389,
279,
1847,
323,
24206,
9141,
9922,
13,
578,
1847,
706,
8040,
311,
33435,
4311,
505,
12387,
5961,
13,
1115,
4652,
18911,
459,
7718,
11,
13882,
33352,
15105,
315,
1268,
311,
1514,
24206,
9141,
627,
791,
3645,
-100
] |
Q: Converting javascript onclick event to react So previously I had very simple html code that did not use any framework.
Part of this method was returning html and generate button with onclick functionality.
return "<button onclick=\"deleteBrochure('" +
albumName +
"','" +
photoKey +
"')\">",
"DELETE",
"</button>"
I know that in react I have to translate onclick to onClick and add {} for method so it would look something like that:
return "<button onClick=\"{() => this.deleteBrochure('" +
albumName +
"','" +
photoKey +
"')}\">",
"DELETE",
"</button>"
I am not getting any browser errors, but deleteBrochure is never triggered.
Is there more to it than just changing syntax?
Just started working on react today, so apologies if this question is too easy for some people.
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 2,301 | [
128000,
48,
25,
1221,
50517,
36810,
12449,
1567,
311,
14085,
2100,
8767,
358,
1047,
1633,
4382,
5385,
2082,
430,
1550,
539,
1005,
904,
12914,
627,
5920,
315,
420,
1749,
574,
13758,
5385,
323,
7068,
3215,
449,
12449,
15293,
627,
693,
4145,
2208,
12449,
4162,
4644,
27368,
59434,
33856,
3694,
21687,
678,
3694,
1,
1882,
1,
3694,
11817,
1622,
3694,
1,
873,
11657,
761,
1,
14762,
761,
22246,
2208,
29,
1875,
40,
1440,
430,
304,
14085,
358,
617,
311,
15025,
12449,
311,
5815,
323,
923,
4792,
369,
1749,
779,
433,
1053,
1427,
2555,
1093,
430,
512,
693,
4145,
2208,
5815,
4162,
90,
368,
591,
420,
7592,
27368,
59434,
33856,
3694,
286,
8176,
678,
3694,
286,
46750,
3694,
286,
6685,
1622,
3694,
286,
68434,
11281,
760,
761,
286,
330,
14762
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48,
25,
1221,
50517,
36810,
12449,
1567,
311,
14085,
2100,
8767,
358,
1047,
1633,
4382,
5385,
2082,
430,
1550,
539,
1005,
904,
12914,
627,
5920,
315,
420,
1749,
574,
13758,
5385,
323,
7068,
3215,
449,
12449,
15293,
627,
693,
4145,
2208,
12449,
4162,
4644,
27368,
59434,
33856,
3694,
21687,
678,
3694,
1,
1882,
1,
3694,
11817,
1622,
3694,
1,
873,
11657,
761,
1,
14762,
761,
22246,
2208,
29,
1875,
40,
1440,
430,
304,
14085,
358,
617,
311,
15025,
12449,
311,
5815,
323,
923,
4792,
369,
1749,
779,
433,
1053,
1427,
2555,
1093,
430,
512,
693,
4145,
2208,
5815,
4162,
90,
368,
591,
420,
7592,
27368,
59434,
33856,
3694,
286,
8176,
678,
3694,
286,
46750,
3694,
286,
6685,
1622,
3694,
286,
68434,
11281,
760,
761,
286,
330,
14762,
-100
] |
Gary Kubiak Mike Sherman Matt LaFleur Mike Shanahan Kyle Shanahan Mike Holmgren Bill Callahan Kirk Cousins Lamar Jackson Robert Griffin Sean McVay Robert Griffin III Dwayne Haskins Sports NFL football Professional football Football Coaching Sports team management changes Sports transactions Sports business
Green Bay Packers Washington Redskins Houston Texans Tennessee Titans Tampa Bay Buccaneers San Francisco 49ers Minnesota Vikings Baltimore Ravens Indianapolis Colts Los Angeles Rams
Matt LaFleur built his NFL foundation in Washington
By KEITH JENKINS - Dec. 04, 2019 06:11 PM EST
GREEN BAY, Wis. (AP) — The Green Bay Packers on Sunday will host the Washington Redskins, a club Packers coach Matt LaFleur knows all too well.
LaFleur's first NFL job was with the Houston Texans. He was hired as an offensive assistant in 2008 by then Texans coach Gary Kubiak after LaFleur spent a season as the offensive coordinator at Ashland, a Division II program in Ashland, Ohio.
LaFleur served as an offensive assistant with the Texans, lending his help to both the wide receivers and quarterbacks. But it was in Washington where LaFleur made his first true mark in the league.
After developing a close relationship with then-Texans offensive coordinator Kyle Shanahan, LaFleur joined Shanahan in Washington when Shanahan's father, Mike, was hired as Redskins head coach and vice president of football operations in 2010.
"Yeah, that was pretty much my foundation in this league," LaFleur said. "I got the opportunity to work with a lot of great people: Mike Shanahan and some of my closest friends in this business and in life, Sean McVay, Kyle Shanahan, Mike McDaniel. There was a lot of good people. It was a really great learning experience for me."
The 40-year-old LaFleur, who played wide receiver at Western Michigan and quarterback at Division II Saginaw Valley State, coached quarterbacks for Washington from 2010-13. His primary responsibility was to mentor rookies Robert Griffin III and Kirk Cousins during the 2012 season.
Under LaFleur, Griffin III set records for the highest passer rating (102.4) and touchdown-to-interception ratio (20-5) by a rookie quarterback. Griffin III went on to win Offensive Rookie of the Year and was voted to the 2013 Pro Bowl.
"It was nothing more than the task at hand and just trying to be the best quarterbacks coach I could be," LaFleur said.
Washington has changed a bit since then. Mike Shanahan is out of the league and Bill Callahan is now leading the Redskins' charge. Sean McVay led the Los Angeles Rams to the Super Bowl last season and Kyle Shanahan has his own team in San Francisco.
"There's so many things that I learned from him," LaFleur said of Kyle Shanahan. "But I think just his detailed approach that he takes every day. He's a guy that has a great vision for what he wants to get done, how to use players, how to adapt and put people in the right position. A lot of my football philosophy has been shaped by him so it's hard to sit here and just say one thing that I've learned from him because there's been so much."
Shanahan's 49ers, who are tied for the best record in the league at 10-2, thumped LaFleur's 9-3 Packers 37-8 in Week 12. Mike McDaniel is on Shanahan's staff as the run game coordinator, while LaFleur's younger brother, Mike, is the passing game coordinator.
Griffin and Cousins are no longer under center in Washington. Griffin is backing up star QB Lamar Jackson in Baltimore and Cousins is in LaFleur's division in Minnesota. But LaFleur knows all about the Redskins' new quarterback, rookie Dwayne Haskins.
"He's an up-and-coming guy," LaFleur said. "He's led them to two wins, back to back. The sky's the limit for him. He's a talented player. That's why he went in the first round."
With a win on Sunday, LaFleur would pass Mike Holmgren and Mike Sherman (9-7) for the most wins by a Packers head coach in their first NFL season.
Follow Keith Jenkins on Twitter: https://twitter.com/MrKeithJenkins | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 5,741 | [
128000,
74067,
735,
55333,
587,
11519,
52983,
13678,
5034,
37,
36077,
11519,
60867,
22826,
31359,
60867,
22826,
11519,
16071,
12591,
1466,
8766,
7290,
22826,
32446,
78704,
62284,
13972,
8563,
41496,
26044,
4584,
53,
352,
8563,
41496,
14767,
423,
90662,
473,
1091,
1354,
13482,
12873,
9141,
21931,
9141,
21424,
75478,
13482,
2128,
6373,
4442,
13482,
14463,
13482,
2626,
198,
20147,
9332,
44628,
6652,
60378,
16386,
53791,
24097,
47711,
33225,
9332,
93168,
5960,
13175,
220,
2491,
388,
19461,
41448,
24899,
48580,
42451,
53084,
9853,
12167,
38603,
198,
40917,
5034,
37,
36077,
5918,
813,
12873,
16665,
304,
6652,
198,
1383,
11337,
4243,
622,
965,
42,
9751,
482,
3799,
13,
220,
2371,
11,
220,
679,
24,
220,
2705,
25,
806,
5975,
26963,
198,
57054,
426,
3097,
11,
16208,
13,
320,
2599,
8
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
74067,
735,
55333,
587,
11519,
52983,
13678,
5034,
37,
36077,
11519,
60867,
22826,
31359,
60867,
22826,
11519,
16071,
12591,
1466,
8766,
7290,
22826,
32446,
78704,
62284,
13972,
8563,
41496,
26044,
4584,
53,
352,
8563,
41496,
14767,
423,
90662,
473,
1091,
1354,
13482,
12873,
9141,
21931,
9141,
21424,
75478,
13482,
2128,
6373,
4442,
13482,
14463,
13482,
2626,
198,
20147,
9332,
44628,
6652,
60378,
16386,
53791,
24097,
47711,
33225,
9332,
93168,
5960,
13175,
220,
2491,
388,
19461,
41448,
24899,
48580,
42451,
53084,
9853,
12167,
38603,
198,
40917,
5034,
37,
36077,
5918,
813,
12873,
16665,
304,
6652,
198,
1383,
11337,
4243,
622,
965,
42,
9751,
482,
3799,
13,
220,
2371,
11,
220,
679,
24,
220,
2705,
25,
806,
5975,
26963,
198,
57054,
426,
3097,
11,
16208,
13,
320,
2599,
8,
-100
] |
Updated 9 September, 2019 - 01:22 beth
Piri Reis Map - How Could a 16th Century Map Show Antarctica Without Ice?
On October 9, 1929, a German theologian named Gustav Adolf Deissmann was cataloguing items in the Topkapi Palace library in Istanbul when he happened across a curious parchment located among some disregarded material. On the gazelle skin parchment was a map, now referred to as the Piri Reis map .
The map was drawn and signed by Turkish cartographer Hagji Ahmed Muhiddin Piri , aka Piri Reis, and is dated to 1513 AD. Reis was an admiral in the Turkish navy, an experienced sailor, and a cartographer, who claimed to have used 20 source maps and charts to construct the map, including 8 Ptolemaic maps, 4 Portuguese maps, an Arabic map, and a map by Christopher Columbus.
Since its discovery, the Piri Reis map has stirred both intrigue and controversy, mostly due to the presence of what appears to be a representation of Antarctica 300 years before it was discovered. Another—if not even more intriguing facet of the appearance of Antarctica—is that it appears to show the land mass before it was covered in ice, over 6000 years ago.
Evidence of Ancient Technology?
The great debate was sparked by Professor Charles Hapgood when he published his theory on the Piri Reis map in his book Maps of the Ancient Sea Kings in 1965. He and a team of students at the University of New Hampshire studied the map and found many anomalies, such as the use of mercatorial projection and the inclusion of a pre-ice Antarctica.
The Greeks were able to create cylindrical maps based on their knowledge of a spherical earth, though mercatorial projection was not used by Europeans until later in the 16 th century, and were also able to use astronomy and geometry to calculate latitude and longitude, though absolute accuracy was not possible until the invention of the chronometer in 1760. While these two feats—amazing as they are—could be explained by use of Greek source maps and charts from the age of Alexander, nothing could explain the inclusion of Antarctica. As a result, Hapgood proposed that the map was based on materials that pre-date 4000 BC, before any known developed languages or progressive civilizations.
This theory implies that a prehistoric civilization had the technology to navigate major seaways and fairly accurately chart the globe. Hapgood also suggested that the topographic depiction of the interior of the continents required aerial capabilities, implying the prehistoric 'super' civilization to be both nautical and aerial masters and leading to the further speculation of either an Atlantean or alien civilization. No evidence has been found to support such theories.
South America vs Antarctica
Skeptics of Hapgood's theory point out that the map is a representation of the South American coastline, pointing to modern physical features of the coast and interior included on the 16 th century map. Otherwise, argue critics, the image would indicate that Antarctica and South America had once been connected at Uruguay, and that Argentina did not yet exist.
While this argument possibly dismisses the presence of Antarctica on the Piri Reis map, other anomalous maps have been found that are identical to the the ice free continent as only 20 th century satellite technology has been able to identify.
Other theories of Hapgood's have already been dismissed, such as his polar shift theory in which he claimed a sudden shift in the inclination of the Earth's axis of rotation in 9,500 BC could have resulted in the displacement of Antarctica, sending it hundreds of miles south and resulting in the alteration of its climate from semi-temperate to freezing. All evidence suggests that this shift could not, and did not, occur.
Undiscovered Civilization?
The true question is whether or not Antarctica is the identifiable continent on the Piri Reis map, or any of the other anomalous maps. If it is, could the Piri Reis map have been based on the documents of a yet undiscovered, prehistoric civilization, one that could possess technology enabling them to travel and accurately chart the globe? Regardless of the true origin of the sources, one thing is for certain: this map opens up the debate over how we view our own history and what, if any, of those views are accurate. Perhaps someday the truth will be discovered.
Top image: The Piri Reis Map. Credit: Mehmetilker / Adobe Stock
By Beth
Piri
E.C. Rammel
E.C. Rammel is the author of Two Is Better Than One and The Oyster and the Pearl. She holds her accreditation in English and Intercultural Studies and has worked as an instructor in numerous U.S. institutions. She... Read More
Pete Wagner wrote on 15 November, 2022 - 14:37
That map would have to have come from a pre-Ice Age/Atlantean source (i.e., from at least 115k years BC), way back when there were no ice caps, and the Richat Structure was, as Plato described, an island within an inland sea. The Atlanteans were obviously a seafaring culture, right up until their destruction, which caused the sudden onset of the Ice Age, putting humanity in the proverbial (and actual?) dark for tens of thousands of years. But some of what they knew survived, as we know with Plato's account, which is dead on but for the zero somebody removed from his timeline of the event.
Nobody gets paid to tell the truth.
Grégoire Jean-F... wrote on 18 September, 2019 - 13:43
Phoenicians. There are some theories (not solid I confess) that they knew all Brazilian coast, much longer before the Europeans. Some incription were found that would be allegedly phoenician. The theory is weak, but could it be a clue to Piri's sources? https://pt.wikipedia.org/wiki/Teoria_da_presença_de_fen%C3%ADcios_no_Brasil
OZ6YM wrote on 19 September, 2019 - 08:13
Historical tales of Plato could be the explanation for these incredibly detailed maps.
Atlantis, the land that disappeared in a single day and night, in a mighty flood and earthquake. Plato says that Atlantis existed 11,600 years ago and had a mighty fleet of ships, 1200 are mentioned, and is it not then possible that they have sailed the world seas and recorded coastal areas?
I think this is where to find the answer.
Incidentally, Atlantis is found in Mauritania, search Google for "Richat Structure" and you will recognize Atlantis by Palto's description.
Jay604 wrote on 17 September, 2019 - 17:34
This is not the first time I have come across about Piri Reis and his map and whether it is authentic or not. However, the strange thing about the claim that his map was sourced from different older maps including from Christopher Columbus'map. Piri Reis'map was dated 1513 while Columbus was born in 1506 making him 8 years old when Piri Reis made his map. Columbus could not have in his possession a map that would help him to circumnavigate the world at that age.
ledom wrote on 17 September, 2019 - 17:02
First off we know what the coastline of Antarctica looks like under the ice cap and it looks nothing like the map. At this time in history map makers made Jerusalem the center of the world, or as best as they could. It was therefore surmised there was land below Africa. It was a guess.
24 December, 2022 - 01:00 Joanna Gillan
Karnak in Egypt is the largest known religious complex on Earth located on the east side of the River Nile at the ancient Egyptian city of Thebes. Referred to as the Vatican of ancient Egypt, many...
Read more about The Awe-Inspiring Karnak Temple Complex and Vatican of Ancient Egypt
27 July, 2022 - 01:57 susan
The Disc of Life in Ancient Texts
In 1988 Lana Corrine Cantrell wrote The Greatest Story Never Told , a book that combined multiple ancient culture histories turned-into-myth as one story – the story of our ancient, off-world, or...
Read more about The Disc of Life in Ancient Texts
25 June, 2022 - 18:51 Robbie Mitchell
Ancient Egyptian Weapons: The Evolution of Warfare
Anyone interested in the history of warfare or weaponry should make sure to look at ancient Egyptian weapons and how the Egyptian armies utilized their technological superiority. Whilst most famous...
Read more about Ancient Egyptian Weapons: The Evolution of Warfare
14 May, 2022 - 22:56 johnblack
The Cataclysm of Ra: Saving Humankind from Hathor Using Beer
The concept of cataclysm is very common in almost all mythologies and religions. It is when the god or gods decide that humanity is not serving them anymore and, thus, they order humanity's...
Read more about The Cataclysm of Ra: Saving Humankind from Hathor Using Beer
7 May, 2022 - 01:58 Cecilia Bogaard
Helicopter Hieroglyphs? Debunking the "Mystery" of the Abydos Carvings
In the ancient city of Abydos, within the famed temple of Seti I, strange hieroglyphs were discovered on the ceiling. Appearing to depict modern or extraterrestrial vehicles, some claim that the...
Read more about Helicopter Hieroglyphs? Debunking the "Mystery" of the Abydos Carvings
20 April, 2022 - 18:57 Sahir
A First of Its Kind - 8,500-Year-Old Wooden Ladder Found at Çatalhöyük
Turkey's Çatalhöyük settlement, which developed between 7,500 BC and 6,400 BC, is often referred to as the world's first, and oldest, metropolitan city, and for good reason. The two most revealing...
Read more about A First of Its Kind - 8,500-Year-Old Wooden Ladder Found at Çatalhöyük | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 1,432 | [
128000,
16593,
220,
24,
6250,
11,
220,
679,
24,
482,
220,
1721,
25,
1313,
293,
774,
198,
47,
21336,
1050,
285,
5135,
482,
2650,
16910,
264,
220,
845,
339,
28200,
5135,
7073,
72787,
17586,
20534,
5380,
1966,
6664,
220,
24,
11,
220,
5926,
24,
11,
264,
6063,
90602,
1122,
7086,
49720,
402,
90585,
1611,
1056,
18022,
574,
16808,
7623,
3673,
304,
279,
7054,
74,
2113,
31396,
6875,
304,
54468,
994,
568,
7077,
4028,
264,
22999,
87204,
7559,
4315,
1063,
43903,
21632,
3769,
13,
1952,
279,
56086,
6853,
6930,
87204,
574,
264,
2472,
11,
1457,
14183,
311,
439,
279,
393,
21336,
1050,
285,
2472,
16853,
791,
2472,
574,
15107,
323,
8667,
555,
24666,
7558,
42606,
67639,
7910,
41769,
386,
12825,
1810,
258,
393,
21336,
1174,
38241,
393,
21336,
1050
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
16593,
220,
24,
6250,
11,
220,
679,
24,
482,
220,
1721,
25,
1313,
293,
774,
198,
47,
21336,
1050,
285,
5135,
482,
2650,
16910,
264,
220,
845,
339,
28200,
5135,
7073,
72787,
17586,
20534,
5380,
1966,
6664,
220,
24,
11,
220,
5926,
24,
11,
264,
6063,
90602,
1122,
7086,
49720,
402,
90585,
1611,
1056,
18022,
574,
16808,
7623,
3673,
304,
279,
7054,
74,
2113,
31396,
6875,
304,
54468,
994,
568,
7077,
4028,
264,
22999,
87204,
7559,
4315,
1063,
43903,
21632,
3769,
13,
1952,
279,
56086,
6853,
6930,
87204,
574,
264,
2472,
11,
1457,
14183,
311,
439,
279,
393,
21336,
1050,
285,
2472,
16853,
791,
2472,
574,
15107,
323,
8667,
555,
24666,
7558,
42606,
67639,
7910,
41769,
386,
12825,
1810,
258,
393,
21336,
1174,
38241,
393,
21336,
1050,
-100
] |
Fluent in 6 languages including Chinese Mandarin, Jean-Marc spent most of his career working for investment banks. He has lived in Asia for 12 years. He has travelled and invested in different countries but has identified significant opportunities in Indonesia, in South Lombok more specifically.
In 2012, he created NagaIndo, a full-scale investment boutique to leverage the appreciation of the area's land values. He moved permanently to South Lombok in 2013.
Neil has been regularly traveling to Indonesia for over 30 years as a born surfer. In Australia, he owned and operated a successful real estate business in construction and development for 25 years. He has now been living in Lombok for 8 years and runs his own business on the South Coast. Neil has this rare talent of envisioning a piece of land and forecast its possible development over the years to come so he hardly gets wrong when it is time to pick up the best land.
Yusuf was born in Bandung, West Java and graduated from Marketing Management.
He like photography and designing. He make a content from simple idea but still keep up with times. | {
"redpajama_set_name": "RedPajamaC4"
} | 3,933 | [
128000,
3968,
11942,
304,
220,
21,
15823,
2737,
8620,
83871,
11,
20263,
5364,
8362,
7543,
1455,
315,
813,
7076,
3318,
369,
9341,
14286,
13,
1283,
706,
12439,
304,
13936,
369,
220,
717,
1667,
13,
1283,
706,
46368,
323,
29091,
304,
2204,
5961,
719,
706,
11054,
5199,
10708,
304,
24922,
11,
304,
4987,
445,
16829,
810,
11951,
627,
644,
220,
679,
17,
11,
568,
3549,
452,
12748,
1451,
78,
11,
264,
2539,
13230,
9341,
53185,
311,
33164,
279,
35996,
315,
279,
3158,
596,
4363,
2819,
13,
1283,
7882,
31859,
311,
4987,
445,
16829,
304,
220,
679,
18,
627,
63040,
706,
1027,
15870,
21646,
311,
24922,
369,
927,
220,
966,
1667,
439,
264,
9405,
1765,
809,
13,
763,
8494,
11,
568,
13234,
323,
24026,
264,
6992,
1972,
12675,
2626,
304
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
3968,
11942,
304,
220,
21,
15823,
2737,
8620,
83871,
11,
20263,
5364,
8362,
7543,
1455,
315,
813,
7076,
3318,
369,
9341,
14286,
13,
1283,
706,
12439,
304,
13936,
369,
220,
717,
1667,
13,
1283,
706,
46368,
323,
29091,
304,
2204,
5961,
719,
706,
11054,
5199,
10708,
304,
24922,
11,
304,
4987,
445,
16829,
810,
11951,
627,
644,
220,
679,
17,
11,
568,
3549,
452,
12748,
1451,
78,
11,
264,
2539,
13230,
9341,
53185,
311,
33164,
279,
35996,
315,
279,
3158,
596,
4363,
2819,
13,
1283,
7882,
31859,
311,
4987,
445,
16829,
304,
220,
679,
18,
627,
63040,
706,
1027,
15870,
21646,
311,
24922,
369,
927,
220,
966,
1667,
439,
264,
9405,
1765,
809,
13,
763,
8494,
11,
568,
13234,
323,
24026,
264,
6992,
1972,
12675,
2626,
304,
-100
] |
loaner can sell it to somebody and collect the money or whatever was due to be paid.
minimum of fifteen years to a most of thirty years.
change within the coming years.
renovations and other such things.
of it. They're paid back large amounts of the cash they have spent on the homes years back.
as security to the cash loaner in exchange for obtaining or building something. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,715 | [
128000,
39429,
261,
649,
4662,
433,
311,
18570,
323,
6667,
279,
3300,
477,
8996,
574,
4245,
311,
387,
7318,
627,
39088,
315,
37755,
1667,
311,
264,
1455,
315,
27219,
1667,
627,
3455,
2949,
279,
5108,
1667,
627,
1466,
869,
811,
323,
1023,
1778,
2574,
627,
1073,
433,
13,
2435,
2351,
7318,
1203,
3544,
15055,
315,
279,
8515,
814,
617,
7543,
389,
279,
10632,
1667,
1203,
627,
300,
4868,
311,
279,
8515,
11941,
261,
304,
9473,
369,
19546,
477,
4857,
2555,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
39429,
261,
649,
4662,
433,
311,
18570,
323,
6667,
279,
3300,
477,
8996,
574,
4245,
311,
387,
7318,
627,
39088,
315,
37755,
1667,
311,
264,
1455,
315,
27219,
1667,
627,
3455,
2949,
279,
5108,
1667,
627,
1466,
869,
811,
323,
1023,
1778,
2574,
627,
1073,
433,
13,
2435,
2351,
7318,
1203,
3544,
15055,
315,
279,
8515,
814,
617,
7543,
389,
279,
10632,
1667,
1203,
627,
300,
4868,
311,
279,
8515,
11941,
261,
304,
9473,
369,
19546,
477,
4857,
2555,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
These Facts About Dogs Will Make You Love Them Even More
Trivia 6/14/19
Since dogs first became domesticated by humans thousands of years ago, they have grown to earn the title of "man's best friend." Not only were they helpful to ward off predators or track animals while hunting, but they also developed a close bond with humans that has spanned generations.
Today, dogs are an integral part of our society with many people not able to imagine their lives without their loyal companion by their side. These canine facts that will give you even more appreciation for our tail-wagging friends.
The reason male dogs lift their legs to pee actually goes back to their primal instincts
Your Dog Can Smell Your Feelings
Kirill KukhmarTASS via Getty Images
Dogs are known for their incredible sense of smell, yet it goes beyond scents that humans are capable of smelling. Dogs actually have the ability to pick up subtle changes in your scent, which allows them to smell what you are feeling emotionally.
They can smell your perspiration when you become nervous or afraid which affects their behavior as well. Dogs have also been known to be able to detect if their owner is sick and even if someone in the house is pregnant.
The First Known Dog Is Really, Really Old
From fossils found in Russia, scientists concluded that the first-known domesticated dog lived 14,000 years ago. However, after a shocking discovery in 2008, it is believed that that the first dog actually lived 31,700 years ago.
The remains of a canine were unearthed in Belgium which suggested that the Aurignacian people of Europe from the Upper Paleolithic period first domesticated dogs. The dog is said to have resembled a Siberian husky although larger, living off of a diet of horse, musk ox, and reindeer.
Dogs Aren't Colorblind
Amy Carkuff / Barcroft Images / Barcroft Media via Getty Images
Contrary to popular belief, dogs aren't actually colorblind like the myth says. They do see in color although not as vividly as humans. A dog's eyesight has been described as a human who is colorblind or the vision of someone with regular eyesight at dusk.
However, they do surpass us when it comes to low-light vision. This is because they have a special light-reflecting layer behind their retinas which captures light better than humans can.
They Can Get Jealous
Mindy Schauer/Digital First Media/Orange County Register via Getty Images
A study at the University of California San Diego showed that dogs really do feel jealousy when their owner gives another dog attention. The experiment had people engaging with three different objects in front of their dogs: a book, a jack-o-lantern, and a realistic stuffed dog that moved and made noises.
When the owner would interact with the fake dog, their dog would be much more engaged and aggressive in trying to get their owners attention, getting in between the two of them. This occurred more so than if the owner interacted with the other objects.
They Lift Their Leg To Appear Bigger
Arterra/UIG via Getty Images
When a male dog is urinating, you may have noticed that they'll raise their leg and do their business on a nearby structure, tree, or lamppost.
They do this in order to get their urine as high as possible on the on the object so that other dogs that smell it will think that they're large and intimidating. In Africa, some dogs have been known to run up tree trunks so that they appear extra-large to all the other animals.
Keep reading to see what incredible things the dogs in Russia have evolved to do
Why Their Noses Are Wet
Roberto Machado Noa/LightRocket/Getty Images
We're all familiar of that tickling feeling when your dog's wet nose comes into contact with your skin. But why are their noses always so wet? Well, dogs' noses are wet because they constantly produce a thin layer of mucus.
They do this as well as frequently lick their noses to help them absorb scent chemicals. Their moist noses are also used as a way to cool down their body temperature along with panting and sweating through their paws.
More Than Half Of US Presidents Have Had Dogs
Smith Collection/Gado/Getty Images
With pet dogs having the highest population in the United States, it's no wonder that over half of the United States presidents have owned dogs while in office. In fact, 32 out of 45 US presidents have owned a dog during their stay in the White House.
George Washington even had seven dogs. He had three American Staghounds named Sweet Lips, Scentwell, and Vulcan, as well as four Black and Tan Coonhounds named Drunkard, Taster, Tipler, and Tipsy.
Dogs Are About As Smart As A Two-Year-Old
Bettmann/Getty Images
Have you ever wondered why dogs and little children sometimes have such a deep connection? Well, it's because they are essentially on the same frequency. After years of research, it has been assumed that dogs have the intelligence relative to a two-year-old child.
While they may differ emotionally, each is capable of recognizing around the same amount of words and gestures. While this estimate may seem like it's underestimating your dog's intelligence, it's important to remember that toddlers are much smarter than most people realize.
Stray Dogs Have Learned To Use The Subway In Russia
Tollkühn/ullstein bild/Getty Images
In Russia, it's not uncommon to see stray dogs on the subway. This is because they've learned how to use it to get from point A to point B. There are as many as 35,000 stray dogs in Moscow and although not all use the complex underground system, those that do get off and on at their regular stops looking for food.
What's particularly fascinating is how they're able to handle the crowded spaces, movements, and loud noises much better than most pet dogs.
Coming up, this dog accessory goes all the way back to Ancient Greece
Yawning Is Contagious Among Them
Peter Macdiarmid/Getty Images
Just like humans, yawning is contagious among dogs. If they see or hear a human yawn, it can trigger the dog to do the same. In a study by psychologist Ramiro Joly-Mascheroni and colleagues from the University of London, 21 out of 29 dogs responded to someone yawning by doing the same.
However, interestingly enough, a dog is four times more likely to yawn if they see someone they know like such as their owner yawn first.
Spiked Collars Go All The Way Back To Ancient Greece
Education Images/UIG via Getty Images
While today, some people might put a spiked collar on their pup either as a joke or to make their dog look more formidable, the origin of that style of collar comes from ancient Greece.
Back then, the Greeks had no shortage of dogs and appreciated and loved them as we do today. So, in order to protect them from wolves and other predators, they fashioned spiked collars so their throats would be protected in case of an attack.
Next, find out why the whiskers on a dog are actually really important
Their Whiskers Help Them See In The Dark
Marka/UIG via Getty Images
A dog's whiskers, which can be found on their muzzle, are actually known as vibrissae. They are touch-sensitive hairs which allow them to sense changes in airflow. This is what helps them to navigate in the dark.
While it doesn't give them superpowers to see clearly in the dark, being able to pick up on subtle changes in air currents gives them the information of the size, shape, and speed of things in the dark.
Dogs Actually Have A Very Good Sense Of Time, Which Means They Know How Long You've Been Gone
Hoberman/UIG via Getty Images
If you think that your dog lives out their days with no real idea what time it is or how much time has passed, you're sadly mistaken. It's actually quite the opposite. Dogs pick up on their owner's routines and habits and form their own routines around them.
Ever notice how your dog knows exactly when it's time for dinner or their daily walk? It's because they're aware of what time of the day it is. Although it's sad to hear, they also know how long you've been gone for when you leave them.
The United States Has The Highest Dog Population
Unsurprisingly, the United States has the highest population of pet dogs in the world, approximately 75.8 million. Now that's a lot of dogs. Due to the massive population of dogs, numerous laws have been passed both state-specific and country-wide regarding the treatment of dogs, selling of dogs, breeding of dogs, and more.
In addition, out of necessity, dog parks, grooming parlors, and pet stores have been springing up all over the place, especially in major cities or heavily populated areas.
Dogs Have Sweat Glands, But Not Like Humans
Uscape/UIG via Getty Images
Dogs don't sweat like humans, but they do sweat. They have two types of sweat glands; merocrine and apocrine glands. While the merocrine glands function similar to human sweat glands, they are located in a dog's paw pads. This is why you might see damp paw prints on the ground on a hot day.
Instead of sweating like humans, in order to regulate their body temperature, they rely on panting. The action evaporates moisture from their tongues and their lungs, which cools them off as the air passes over their tissue.
The Legend Of The Werewolf
DeAgostini/Getty Images
After the fall of Rome, human survival once again became more important than breeding, owning, or taking care of dogs. Although dogs were popular in ancient Roman culture, many people were forced to leave their animals behind as they were no longer capable of caring for them.
During this time, legends of werewolves began to spread although they were just packs of stray dogs that harassed the people and livestock in the struggling villages and towns.
Dogs Can Hear Four Times As Far As Humans
Fox Photos/Getty Images
While puppies are born blind and deaf, their hearing certainly improves over time and far surpasses our own capabilities. Not only can they hear significantly further than us, they also can hear pitches that the human ear cannot.
Dogs can detect a frequency range of 67 to 45,000 hertz with humans only having a range of 64 to 23,000 hertz. They also are capable of locating the source of a sound in 6/100ths of a second thanks to the shape of their ears.
They Have Been Used In The Military Throughout History
Oli Scarff/Getty Images
Much like how dogs are used today in police forces and the military, medieval armies utilized them in warfare as well. It was not unheard of to have dogs such as Great Danes and Mastiffs wearing armor and spikes charging the field with the other soldiers.
However, if they weren't being used on the open field, they were often used as defenders of the supply caravans. Not only could they bark to sound an alarm but they were also fierce fighters that few people were willing to go up against.
They Have Interesting Ancestors
BabaMail/Pi
Although there are many different breeds of dogs, all dogs can be traced back 40 million years to the now extinct Miacis. The Miacis was a carnivorous and weasel-like animal that lived in the canopy of trees and dens.
They first appeared in the late Paleocene period and continued through the Eocene period. Eventually, they evolved into the Tomarctus, a direct ancestor of the genus Canis, which includes the wolf, jackal, as well as the dog.
Why They Curl Up In A Ball
Raquel Maria Carbonell Pagola/LightRocket via Getty Images
Although they may not do it all of the time, while they're sleeping, most dogs will curl up into a ball. This is an instinct that has been passed down to them from their ancestors who would curl up to protect their vital organs while they slept in the wild.
In addition, it is a way for them to stay warm. Tucking their nose under their tail while in a ball conserves body heat, which is what many dogs sleeping outside will do.
dogs Pets | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 6,045 | [
128000,
9673,
46083,
10180,
39525,
4946,
7557,
1472,
10919,
49038,
7570,
4497,
198,
56106,
220,
21,
14,
975,
14,
777,
198,
12834,
12875,
1176,
6244,
13018,
660,
555,
12966,
9214,
315,
1667,
4227,
11,
814,
617,
15042,
311,
7380,
279,
2316,
315,
330,
1543,
596,
1888,
4333,
1210,
2876,
1193,
1051,
814,
11190,
311,
26741,
1022,
56217,
477,
3839,
10099,
1418,
23330,
11,
719,
814,
1101,
8040,
264,
3345,
11049,
449,
12966,
430,
706,
9575,
19212,
22540,
627,
15724,
11,
12875,
527,
459,
26154,
961,
315,
1057,
8396,
449,
1690,
1274,
539,
3025,
311,
13085,
872,
6439,
2085,
872,
29947,
22489,
555,
872,
3185,
13,
4314,
76082,
13363,
430,
690,
3041,
499,
1524,
810,
35996,
369,
1057,
9986,
2695,
351,
3252,
4885,
627,
791,
2944,
8762,
12875,
12157
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
9673,
46083,
10180,
39525,
4946,
7557,
1472,
10919,
49038,
7570,
4497,
198,
56106,
220,
21,
14,
975,
14,
777,
198,
12834,
12875,
1176,
6244,
13018,
660,
555,
12966,
9214,
315,
1667,
4227,
11,
814,
617,
15042,
311,
7380,
279,
2316,
315,
330,
1543,
596,
1888,
4333,
1210,
2876,
1193,
1051,
814,
11190,
311,
26741,
1022,
56217,
477,
3839,
10099,
1418,
23330,
11,
719,
814,
1101,
8040,
264,
3345,
11049,
449,
12966,
430,
706,
9575,
19212,
22540,
627,
15724,
11,
12875,
527,
459,
26154,
961,
315,
1057,
8396,
449,
1690,
1274,
539,
3025,
311,
13085,
872,
6439,
2085,
872,
29947,
22489,
555,
872,
3185,
13,
4314,
76082,
13363,
430,
690,
3041,
499,
1524,
810,
35996,
369,
1057,
9986,
2695,
351,
3252,
4885,
627,
791,
2944,
8762,
12875,
12157,
-100
] |
Dear applicants TNPSC Group 4 Exam Notification 2018 has declared on the official website. Participants who wish to apply can send online application forms. Tamil Nadu Group 4 Notification Pdf will be holding Jr. Assistant, Typist, Field Surveyor vacancies. TNPSC Group 4 Advertisement Pdf file has declared on 14th November 2017. The last date for sending the completely filled application form is 13th December 2017. Candidates who are going to take part in the examination can check TNPSC Exam Eligibility, Apply Online Dates from the official links.
Fresh Update on 30 Jan 2018:Dear Applicants now the online registration for Group 4 Vacancy has closed. Candidates who are preparing Group 4 Exam, They can check post wise TNPSC Group 4 Exam Syllabus from here. Exam is going to be held on 11.02.2018.
About TNPSC:TNPSC stands for Tamil Nadu Public Service Commission. Earlier It was known as Madras Service Commission. It organizes various departmental, ministerial competitive examination throughout the year. The main aim of TNPSC Portal is to select eligible and fresh talent to improve the functionality and efficiency of TNPSC Department. Participants who wish to know more about the code of conduct, Examination operated by the TNPSC then Click Here (TNPSC Portal).
What is the Eligibility Criteria for TNPSC Group IV Notification 2018 | Tamil Nadu PSC Group 4 Vacancy 2018?
How to Apply Online for TNPSC Group 4 Notification 2018? How to Fill TNPSC Group IV Exam Online Form 2018?
Participants who are appearing in the TNPSC Group 4 Notification 2018 need to check some important details first. Here in this section participants can check TNPSC Group 4 Online Registration Date, Tamil Nadu PSC Gr IV recruitment 2018 Division and other mandate details. After reading all these information correctly, applicants can apply online for TNPSC Group 4 Exam Notification 2018.
Participants can check the post wise TNPSC Group 4 notification 2018 Classification and TN Group IV Online Registration Dates from the links we are indicating ahead. From this link, you will get details about the reservation of vacancies on particular posts. Also, you will be able to check the TNPSC Online Registration Dates to complete the submission of Tamil Nadu PSC Group 4 Application Form 2018 on time. To get all the details Click Here (Important Dates & Vacancy Distributions for each post).
Participants who have now checked the TNPSC Group 4 Exam Notification details should fulfill another important aspect which is Eligibility Criteria. It holds important details like Education Qualification, Age Limit, Application Fees etc. Participants must satisfy the eligibility criteria as without it TNPSC Group 4 Application Form 2018 will not be accepted. Check TNPSC Eligibility Criteria Here.
Applicants should have SSLC Certificate (12th pass) from any recognized university or institute with eligibility to appear in the high secondary course of Colleges. Appliers must have knowledge of Typing in English, who are applying for Typist & Steno Typist Vacancies. Rest of the information will be available on the declaration of Tamil Nadu PSC Advt 2018.
Participants who are applying for TNPSC Group 4 Notification 2018 need to be minimum 18 years old. The maximum age of each category is different. The maximum age for SC/ST/ Widow is 35 year. The most backward class should be maximum 32 years old. The applicants who belong to the Other category (general) should be maximum 30 years old. Age relaxation in upper age will be applicable as per govt. rules and regulations.
Applicants will be shortlisted on the basis of marks obtained in the Written Examination. Final selection will be based on the certificate verification of the participants. Participants should carefully answer each and every question. Candidates can check the TNPSC Selection Process 2018 to get all the details regarding TNPSC Group IV Syllabus Exam Pattern 2018 Pdf.
Candidates who are interested to apply must check the TNPSC Apply Online Process 2018. Commencement of online registration process for TNPSC 2018 Jobs will be starting from 14.11.2017. Participants should complete their registration process in December 2017. On successful submission of TNPSC Application Form, 2018 participants will be called for TNPSC Group 4 Notification Test 2018. Here we are indicating the direct links to download TNPSC Group IV Notification 2018 Pdf.
On the home page on the right side click on the Latest Notification section.
Now here you will get all the terms and conditions for TNPSC 2018 Phase IV Vacancy.
After reading the notification go for Apply Online links.
Enter all the information i.e. Personal Information, Permanent Postal Address, Recent Passport Size photo, Signature etc.
Submit all the details and then note the Registration ID and Password for future use.
Conclusion:TNPSC Group 4 Exam Notification 2018 for the post-Jr. Assistant, Field Surveyor, Steno Typist vacancies. Registration will start from Third Week of November 2017. Last date for submitting the application form 14.12.2017.
How to search my old hall ticket?
sir, I am Swetha pls tell me the best material for tnpsc exam also how to study?????
2.To get daily alerts on Jobs then click on SUBSCRIBE button.
You can check the end of this page!
I am railway staff from Tiruchirappalli division in the southern railway in Tamilnadu.any information about RRB railway exam.study material & notes are available.
Sir i am Banu ….pls tell me the best material for rrb exam& also how to study?? | {
"redpajama_set_name": "RedPajamaC4"
} | 8,892 | [
128000,
31765,
32177,
350,
27321,
3624,
5856,
220,
19,
33410,
16980,
220,
679,
23,
706,
14610,
389,
279,
4033,
3997,
13,
52878,
889,
6562,
311,
3881,
649,
3708,
2930,
3851,
7739,
13,
44883,
75905,
5856,
220,
19,
16980,
29250,
690,
387,
10168,
16014,
13,
22103,
11,
17977,
380,
11,
8771,
24507,
269,
67751,
13,
350,
27321,
3624,
5856,
220,
19,
67102,
29250,
1052,
706,
14610,
389,
220,
975,
339,
6841,
220,
679,
22,
13,
578,
1566,
2457,
369,
11889,
279,
6724,
10409,
3851,
1376,
374,
220,
1032,
339,
6790,
220,
679,
22,
13,
65538,
889,
527,
2133,
311,
1935,
961,
304,
279,
24481,
649,
1817,
350,
27321,
3624,
33410,
69124,
3225,
11,
21194,
8267,
52724,
505,
279,
4033,
7902,
627,
56753,
5666,
389,
220,
966,
4448,
220,
679
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
31765,
32177,
350,
27321,
3624,
5856,
220,
19,
33410,
16980,
220,
679,
23,
706,
14610,
389,
279,
4033,
3997,
13,
52878,
889,
6562,
311,
3881,
649,
3708,
2930,
3851,
7739,
13,
44883,
75905,
5856,
220,
19,
16980,
29250,
690,
387,
10168,
16014,
13,
22103,
11,
17977,
380,
11,
8771,
24507,
269,
67751,
13,
350,
27321,
3624,
5856,
220,
19,
67102,
29250,
1052,
706,
14610,
389,
220,
975,
339,
6841,
220,
679,
22,
13,
578,
1566,
2457,
369,
11889,
279,
6724,
10409,
3851,
1376,
374,
220,
1032,
339,
6790,
220,
679,
22,
13,
65538,
889,
527,
2133,
311,
1935,
961,
304,
279,
24481,
649,
1817,
350,
27321,
3624,
33410,
69124,
3225,
11,
21194,
8267,
52724,
505,
279,
4033,
7902,
627,
56753,
5666,
389,
220,
966,
4448,
220,
679,
-100
] |
VALUABLE PARTS OF ANIMALS. POACHING.
This downloadable printable is best suited for high school students, elementary school students and adults at Pre-intermediate (A2) and Intermediate (B1) level. It is a useful material for teaching Passive voice or active voice in English, and is excellent for strengthening your class' Speaking and Reading skills. It features the theme of Animals.
didarka is from/lives in Kazakhstan and has been a member of iSLCollective since 2011-05-04 15:09:46. didarka last logged in on 2019-02-05 13:54:59, and has shared 130 resources on iSLCollective so far. | {
"redpajama_set_name": "RedPajamaC4"
} | 4,245 | [
128000,
5711,
52,
3578,
6909,
50,
3083,
2147,
38677,
50,
13,
13228,
12137,
1753,
627,
2028,
70752,
43095,
374,
1888,
32599,
369,
1579,
2978,
4236,
11,
36256,
2978,
4236,
323,
12884,
520,
5075,
45994,
14978,
320,
32,
17,
8,
323,
61748,
320,
33,
16,
8,
2237,
13,
1102,
374,
264,
5505,
3769,
369,
12917,
72689,
7899,
477,
4642,
7899,
304,
6498,
11,
323,
374,
9250,
369,
48513,
701,
538,
6,
45072,
323,
18242,
7512,
13,
1102,
4519,
279,
7057,
315,
47966,
627,
23770,
847,
64,
374,
505,
13631,
1924,
304,
73537,
323,
706,
1027,
264,
4562,
315,
602,
8143,
48604,
535,
2533,
220,
679,
16,
12,
2304,
12,
2371,
220,
868,
25,
2545,
25,
2790,
13,
1550,
847,
64,
1566,
14042,
304,
389,
220,
679,
24,
12,
2437
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
5711,
52,
3578,
6909,
50,
3083,
2147,
38677,
50,
13,
13228,
12137,
1753,
627,
2028,
70752,
43095,
374,
1888,
32599,
369,
1579,
2978,
4236,
11,
36256,
2978,
4236,
323,
12884,
520,
5075,
45994,
14978,
320,
32,
17,
8,
323,
61748,
320,
33,
16,
8,
2237,
13,
1102,
374,
264,
5505,
3769,
369,
12917,
72689,
7899,
477,
4642,
7899,
304,
6498,
11,
323,
374,
9250,
369,
48513,
701,
538,
6,
45072,
323,
18242,
7512,
13,
1102,
4519,
279,
7057,
315,
47966,
627,
23770,
847,
64,
374,
505,
13631,
1924,
304,
73537,
323,
706,
1027,
264,
4562,
315,
602,
8143,
48604,
535,
2533,
220,
679,
16,
12,
2304,
12,
2371,
220,
868,
25,
2545,
25,
2790,
13,
1550,
847,
64,
1566,
14042,
304,
389,
220,
679,
24,
12,
2437,
-100
] |
*please make your reservation by all means until the day before the arrival date if you want to leave your luggage here from 11:00 to 16:00 because the entrance door is closed this period.
Also, you have to pay an additional 200 yen when you want to leave your luggage before 16:00.
●There's no cancellation fee up to 8 days before arrival.
●The dormitory room may have the movement of the room by a day when there are the reservations of all dormitory room.
A newly-built guest house opened on August 1, 2011. The first guesthouse with a bar space in Sendai. Conveniently located 15 minutes from the JR Sendai station by taxi, and 5 minutes from the Nigatake Station on the Senseki Line by foot.
JR Tohoku Main Line, Higashi Sendai Station Get on the Tohoku Main line, and get off at the Higashi Sendai station (1 station, about 5 minutes).
This is a wonderful hostel. The people are very friendly and the place is nice and clean. They offer a set meal dinner every night for ¥700 that focuses on fresh and local foods and is always delicious. They also have beer and liquor for sale, but let you bring in your own if you prefer. I definitely recommend this hostel to anyone staying in Sendai.
I had so much fun staying at Umebachi! Every night pretty much all the guests and the staff gathered in the common area and just hanged out. The dinner they offer is also very delicious! Thank you!
Staff are just lovely! They serve dinner for 700 yen with all the guests and friends of the staff which allows for great cultural exchanges. Be warned that most guests staying here are japanese (as is the staff) so it can be a bit difficult if you don't know some basic japanese phrases.
The staff are really friendly and make the effort to talk to you in English. They make dinner every night which you can have for the good price of 700 yen, and if you do not want what they are making do not let that stop you from joining them with the chatter and laughter of the place. We loved our time there and real want to go back.
It can be tricky to find if you use GPS google maps as it will take you in circles away from the location. It was pretty laid back I was only here a single night to crash but staff was really nice. Not far from the Rakuten Baseball Stadium if you're looking to watch a game.
Very friendly staff, free breakfast and available dinner were very good. Slightly difficult to find, but got there eventually! Unfortunately, some of the other guests were a tad noisy, which slightly spoiled my stay. Be warned, most of the guests are Japanese, so if you don't speak the language you may have a hard time.
Uncomfortable bedding situation, also overpriced for what you get. Breakfast is a couple pieces of bread, and after not sleeping all night because of guests waking up early and the hard beds, I was refused to be given breakfast after being 45 mins late to it. You can stay for free in Sendai with Kodo, much better stay, find him on Couchsurfer! | {
"redpajama_set_name": "RedPajamaC4"
} | 4,568 | [
128000,
9,
31121,
1304,
701,
28767,
555,
682,
3445,
3156,
279,
1938,
1603,
279,
19163,
2457,
422,
499,
1390,
311,
5387,
701,
51597,
1618,
505,
220,
806,
25,
410,
311,
220,
845,
25,
410,
1606,
279,
20396,
6134,
374,
8036,
420,
4261,
627,
13699,
11,
499,
617,
311,
2343,
459,
5217,
220,
1049,
58440,
994,
499,
1390,
311,
5387,
701,
51597,
1603,
220,
845,
25,
410,
627,
45048,
3947,
596,
912,
36935,
11307,
709,
311,
220,
23,
2919,
1603,
19163,
627,
45048,
791,
30209,
10843,
3130,
1253,
617,
279,
7351,
315,
279,
3130,
555,
264,
1938,
994,
1070,
527,
279,
41162,
315,
682,
30209,
10843,
3130,
627,
32,
13945,
52714,
8810,
3838,
9107,
389,
6287,
220,
16,
11,
220,
679,
16,
13,
578,
1176,
8810,
7830,
449,
264
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
9,
31121,
1304,
701,
28767,
555,
682,
3445,
3156,
279,
1938,
1603,
279,
19163,
2457,
422,
499,
1390,
311,
5387,
701,
51597,
1618,
505,
220,
806,
25,
410,
311,
220,
845,
25,
410,
1606,
279,
20396,
6134,
374,
8036,
420,
4261,
627,
13699,
11,
499,
617,
311,
2343,
459,
5217,
220,
1049,
58440,
994,
499,
1390,
311,
5387,
701,
51597,
1603,
220,
845,
25,
410,
627,
45048,
3947,
596,
912,
36935,
11307,
709,
311,
220,
23,
2919,
1603,
19163,
627,
45048,
791,
30209,
10843,
3130,
1253,
617,
279,
7351,
315,
279,
3130,
555,
264,
1938,
994,
1070,
527,
279,
41162,
315,
682,
30209,
10843,
3130,
627,
32,
13945,
52714,
8810,
3838,
9107,
389,
6287,
220,
16,
11,
220,
679,
16,
13,
578,
1176,
8810,
7830,
449,
264,
-100
] |
At a time when National Monuments are under attack and Congress is considering a number of bills attacking public lands and the health of the environment, the mountain biking community has allied itself with anti-parks Republicans led by Rep. Tom McClintock (R – CA) and Sen. Mike Lee (R-UT) in an attempt to gut a key provision in the landmark 1964 Wilderness Act.
The change targets a clause that prohibits mechanical transport in wilderness areas. The bills designated as HR 1349 in Congress and its Senatorial counterpart introduced by Sen. Lee would allow local agencies to decide whether to permit mountain bikes in wilderness areas where they have historically been forbidden. Rep. McClintock introduced the bill to the House of Representatives in March of 2017, and although it has gone no further than introduction in the House, the Sustainable Trails Coalition (STC) continues to rally support from the mountain biking community with unintentionally divisive consequences.
For the mountain biking community, this prohibition has denied cycling access to over 110 million acres of public land and as well as millions more acres of Wilderness Study Areas (WSA) ('Wilderness Study Areas' are regions set aside by land management agencies for potential designation as Wilderness. Sometimes they become Wilderness by act of Congress, other times they don't — and in the meantime some places are basically managed as Wilderness areas while others allow for continued non-Wilderness uses like mountain biking – Ed.). In some cases, bikers who have ridden on and cared for pre-wilderness land have suddenly lost access when it receives WSA or wilderness designation. Citing decades of frustration and unfairness, a large portion of the mountain biking community supports the proposed change to the act, and local associations have mobilized to lobby politicians on their behalf. Mountain bikers also assert that they are exceptional trail stewards that will care for the wilderness areas at a time when public agencies are low on cash and struggling to maintain trails without volunteer efforts.
As a result of their controversial assault on the machine-prohibition, the bills have created division in the outdoor community. Conservation groups have come out against HR 1349, and even the International Mountain Biking Association (IMBA) opposes the bill. Local mountain biking associations have begun splintering from IMBA, stating the organization doesn't represent their interests even though IMBA takes a more pragmatic course of pursuing alternative-use designations such as National Recreation Areas.
The creation of numerous associations at cross-purposes dilutes the mountain biking community's impressive organizational strength as well as the overall organizational strength of the outdoor community. The conversation surrounding the bill strengthens artificial divides between mountain bikers and other trail users. Social media battles of dueling "whataboutisms" lead to finger-pointing over who uses public land in the most responsible or irresponsible way, with bikers sniping about "hiker privilege" and hikers counting tire tracks on the "Perfect Cycling Trail" (PCT).
Worst of all, the STC has shown no compunction in allying with some of the politicians leading the attack on public lands. Rep. McClintock, the original bill's author, has earned himself a lifetime 4% rating from the League of Conservation Voters, a watchdog group that tracks voting records on environmental issues. McClintock has opposed clean water and air measures, wildlife protections, public input on public land issues, recognition of climate change as a national security threat, recognition of the cost of climate change, and the ability of the President to designate National Monuments. Sen. Lee isn't much better, as he has a lifetime 8% rating from the League of Conservation Voters, and he recently lauded Secretary Ryan Zinke's recommendations to shrink National Monuments within his own state. In the last year, he co-sponsored six anti-parks bills, introduced legislation to weaken the Endangered Species Act, and sponsored four anti-parks amendments to budgets, including some that would sell off public lands, prevent new National Monuments, and block existing parks from access to the Land and Water Conservation Fund — something that was literally created to fund parks and public recreation.
Are these the types of "friends to the outdoors" the STC and associated mountain biking associations want to ally with just to get some single track trails in wilderness areas?
It's a shame that organizations that have shown so much promise and success advocating for public lands would turn around and weaken them by making a Faustian bargain with anti-parks Republicans to suit their own desires. While it is undoubtedly frustrating to not be able to enjoy all public land in the exact way you want to, wilderness exists for a reason: to spare the last bits of undeveloped land from the unceasing mechanization of mankind. Where else can you leave civilization behind to experience the world in as close to a pristine state as it's possible to get? Is being able to ride a bike on a previously forbidden trail more important than ensuring we never lose wilderness areas by inadvertently weakening their protection?
Supporting these bills and the drive toward changing the second most important conservation act in human history is the wrong move at the wrong time for the wrong reasons. For anybody concerned about the potential passage of these bills and subsequent erosion of the Wilderness Act, there are steps to take. You can contact your district's representative and state your opposition to the bill. You can definitely contact Rep. McClintock's office to share your opposition.
But most importantly of all, vote. The June 5th election is right around the corner. Research your candidates and vote for the one most likely to value public land (which will probably also go hand in hand with valuing things like the environment). The most effective way to oppose this or any other measure like it is to vote out the anti-park Republicans.
The Americans with Disabilities Act of 1990 allows wheelchairs into wilderness areas.
Also, the belief that "people should be kept out" is misdirection. Everybody, including mountain bikers, is allowed in Wilderness areas. Mountain bikes, however, are not.
I popped in just to provide an update on the fate of HR 1349 (Died with the last Congress). I saw this comment, and I wanted to point out the Americans with Disabilities Act of 1990 does make an allowance for wheelchairs in wilderness areas, at least where accessibility is possible.
It doesn't merit a new article, but it's worth noting here that HR 1349 "died" with the last Congress. Bills don't carry over from Congress to Congress, and the current Congress has yet to introduce a similar or equivalent bill. With a Democratic House, it's a little hard to imagine anybody taking this issue up again in a meaningful way, but we'll wait and see what happens.
Your article is riddled with fallacies that create more confusion on the topic.
As much as you like to point at the Sustainable Trails Coalition http://www.sustainabletrailscoalition.org/ for not allying with leaders of public lands maybe you could do the same with your fellow trail users?
I like to hike. I like to bike.
Thank you for clearly labelling it as "opinion". I support the STC and am disappointed that you had to make it a partisan political rant.
I see a list of genuinely valuable things they're seeking to accomplish for disabled people, and your idea is maddeningly absent! You might contact them to press for support of your plan.
A good start also would be to volunteer to widen local singletrack bike trails for wheelchairs, which if you think about it, makes lots of sense as the right place to begin since those trails are already safely being used by wheeled traffic, they don't have pesky steps, waterbars or switchbacks, they'd only need to be widened by about 64 inches (probably using a bulldozer). Maybe check with mountain biking organizations in your area to see if they're receptive to the plan.
In the meantime you're wasting your valuable time fingerwagging at editorials here. Godspeed!
Does it ever bother some of you at all that to not allow mechanized travel prevents many with handicaps from enjoying their public land? I think with quiet modern vehicles, some electric all the wilderness should be accessible for travel when reasonable. Designated wilderness etc. seems like a land grab for those that disdain the general public and often believe people should be kept out as these lands are for the plants and animals. At the very least allow it where motor routes once existed. I know of plenty in what is now designated wilderness.
Obviously, digging into the minutiae of Forest Service policy and its attempts to interpret the act reveals some ridiculous contradictions. However, flaws in the forest service's interpretation don't suddenly void the Wilderness Act's intention and purpose. Besides, you can just as well point out that the "non-living power source" language you cite is in direct contradiction to the mandate written into the Wilderness Act, and therefore was never valid in the first place.
In other words, just because the forest service got confused when it tried to adapt its policy to a mandate from Congress, it doesn't mean we toss out key provisions in the mandate. It's the other way around.
"3. Mechanical Transport. Any contrivance for moving people or material in or over land, water, or air, having moving parts, that provides a mechanical advantage to the user, and that is powered by a living or nonliving power source. This includes, but is not limited to, sailboats, hang gliders, parachutes, bicycles, game carriers, carts, and wagons. It does not include wheelchairs when used as necessary medical appliances. It also does not include skis, snowshoes, rafts, canoes, sleds, travois, or similar primitive devices without moving parts."
Example one: A fishing reel has at least one moving part, the reel rotating about the spindle. It moves material, the line and lure, through the air and water. The moving parts of the reel retrieves the material from the water. The mechanical advantage is the user can use a longer line (compared to a fixed line attached to the end of a pole) and can fish further out into the body of water.
Example two: Rowboats support the weight of the oars using oarlocks, moving parts which act as fulcrums for levers (the oars) so that the user (water traveler) can operate two oars at once, instead of using both arms/hands on a single canoe paddle.
Example three: Hiking poles give a tremendous mechanical advantage to the hiker, especially when carrying a heavy pack, as the unstable biped now becomes a more stable quadruped. Try crossing a fast-moving stream without them. The violation happens when the hiking poles have shock absorbers in them, which are moving parts by the above definition, and are banned in designated Wilderness.
Rowboats and bicycles are mentioned in the same sentence in this memo from 1964, where Forest Service employees are trying to figure out what is meant by "mechanical transport." Did the framers of the Wilderness Act mean to ban everything with "moving parts?" Because that would mean banning rowboats along with bicycles.
Instead, they adopted the second definition, effective from 1964 to 1984, which defined "mechanical transport" as that which has a "non-living power source." Now, the USFS lawyers have adopted a completely reductionist definition, as if to say, "You want to ban 'mechanized transport?' fine. Here's a definition that covers absolutely everything." | {
"redpajama_set_name": "RedPajamaC4"
} | 6,623 | [
128000,
1688,
264,
892,
994,
5165,
3206,
2901,
527,
1234,
3440,
323,
8151,
374,
13126,
264,
1396,
315,
19123,
23664,
586,
12098,
323,
279,
2890,
315,
279,
4676,
11,
279,
16700,
67180,
4029,
706,
54502,
5196,
449,
7294,
2320,
7341,
13063,
6197,
555,
3402,
13,
8529,
60740,
396,
1197,
320,
49,
1389,
9362,
8,
323,
5476,
13,
11519,
12336,
320,
49,
12,
1406,
8,
304,
459,
4879,
311,
18340,
264,
1401,
17575,
304,
279,
38350,
220,
5162,
19,
85192,
3298,
627,
791,
2349,
11811,
264,
22381,
430,
59538,
22936,
7710,
304,
49362,
5789,
13,
578,
19123,
24073,
439,
23096,
220,
9565,
24,
304,
8151,
323,
1202,
23072,
532,
45116,
11784,
555,
5476,
13,
12336,
1053,
2187,
2254,
13607,
311,
10491,
3508,
311,
11810,
16700,
31553,
304,
49362,
5789
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
1688,
264,
892,
994,
5165,
3206,
2901,
527,
1234,
3440,
323,
8151,
374,
13126,
264,
1396,
315,
19123,
23664,
586,
12098,
323,
279,
2890,
315,
279,
4676,
11,
279,
16700,
67180,
4029,
706,
54502,
5196,
449,
7294,
2320,
7341,
13063,
6197,
555,
3402,
13,
8529,
60740,
396,
1197,
320,
49,
1389,
9362,
8,
323,
5476,
13,
11519,
12336,
320,
49,
12,
1406,
8,
304,
459,
4879,
311,
18340,
264,
1401,
17575,
304,
279,
38350,
220,
5162,
19,
85192,
3298,
627,
791,
2349,
11811,
264,
22381,
430,
59538,
22936,
7710,
304,
49362,
5789,
13,
578,
19123,
24073,
439,
23096,
220,
9565,
24,
304,
8151,
323,
1202,
23072,
532,
45116,
11784,
555,
5476,
13,
12336,
1053,
2187,
2254,
13607,
311,
10491,
3508,
311,
11810,
16700,
31553,
304,
49362,
5789,
-100
] |
In a medium bowl stir together grapes, orange juice, sugar and orange peel. Refrigerate at least 3 hours.
Just before serving, in a small bowl stir together whipped topping and almond extract.
To serve, place chilled grapes in 4 small glasses. Top with almond-flavored whipped topping and sprinkle with toasted almonds. | {
"redpajama_set_name": "RedPajamaC4"
} | 952 | [
128000,
644,
264,
11298,
19763,
23935,
3871,
66008,
11,
19087,
23661,
11,
13465,
323,
19087,
58212,
13,
75258,
349,
520,
3325,
220,
18,
4207,
627,
10156,
1603,
13788,
11,
304,
264,
2678,
19763,
23935,
3871,
64357,
61376,
323,
63168,
8819,
627,
1271,
8854,
11,
2035,
85042,
66008,
304,
220,
19,
2678,
29247,
13,
7054,
449,
63168,
12556,
76486,
64357,
61376,
323,
85947,
449,
93972,
88922,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
644,
264,
11298,
19763,
23935,
3871,
66008,
11,
19087,
23661,
11,
13465,
323,
19087,
58212,
13,
75258,
349,
520,
3325,
220,
18,
4207,
627,
10156,
1603,
13788,
11,
304,
264,
2678,
19763,
23935,
3871,
64357,
61376,
323,
63168,
8819,
627,
1271,
8854,
11,
2035,
85042,
66008,
304,
220,
19,
2678,
29247,
13,
7054,
449,
63168,
12556,
76486,
64357,
61376,
323,
85947,
449,
93972,
88922,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
I went out for my first rollerblade of 2019. It was a beautiful day, and it was a wonderful rollerblade... for the first half of my skate. Right after I turned around to head back, I noticed my left skate felt weird. I looked down and saw that the front wheel was wobbling. When I stopped to investigate, I discovered that this was because one of the two bolts that holds the wheel in was gone. I couldn't find it anywhere nearby, so I skated on back with a wobbly front wheel. I made it, but I got more of an ankle workout than I was anticipating.
So I guess I'll be shopping for some new rollerblades this weekend. This pair was never very good. I need to find a place that sells nicer ones.
I'm going to assume that if you want to read about the shutdown and our (perhaps temporary) reprieve from it or Stone's arrest, you can find things to read.
The only related item I'll share is this piece from Greg Sargent about how Pelosi has found a way to counteract Trump's nonsense.
Here's a good article about the city of Eureka returning an island to the Wiyot tribe.
Electric pickup trucks are coming. I think that's a very good thing.
And here's another good thing: It looks like the Ebola vaccine is working.
Derek Lowe had two posts of general interest this week: One on the fact that we have (finally, only now) figured out the mechanism of action of quinine against malaria, and one on a possible link between gum disease and Alzheimer disease.
In recommended listening; Krista Tippet reposted her interview with Mary Oliver, and I really enjoyed listening to it.
That quinine article was fascinating! | {
"redpajama_set_name": "RedPajamaC4"
} | 4,528 | [
128000,
40,
4024,
704,
369,
856,
1176,
29551,
63827,
315,
220,
679,
24,
13,
1102,
574,
264,
6366,
1938,
11,
323,
433,
574,
264,
11364,
29551,
63827,
1131,
369,
279,
1176,
4376,
315,
856,
43878,
13,
10291,
1306,
358,
6656,
2212,
311,
2010,
1203,
11,
358,
14000,
856,
2163,
43878,
6612,
16682,
13,
358,
7111,
1523,
323,
5602,
430,
279,
4156,
13587,
574,
289,
677,
9894,
13,
3277,
358,
10717,
311,
19874,
11,
358,
11352,
430,
420,
574,
1606,
832,
315,
279,
1403,
49939,
430,
10187,
279,
13587,
304,
574,
8208,
13,
358,
7846,
956,
1505,
433,
12660,
14373,
11,
779,
358,
1940,
660,
389,
1203,
449,
264,
289,
21046,
398,
4156,
13587,
13,
358,
1903,
433,
11,
719,
358,
2751,
810,
315,
459,
39448,
26308,
1109,
358
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
40,
4024,
704,
369,
856,
1176,
29551,
63827,
315,
220,
679,
24,
13,
1102,
574,
264,
6366,
1938,
11,
323,
433,
574,
264,
11364,
29551,
63827,
1131,
369,
279,
1176,
4376,
315,
856,
43878,
13,
10291,
1306,
358,
6656,
2212,
311,
2010,
1203,
11,
358,
14000,
856,
2163,
43878,
6612,
16682,
13,
358,
7111,
1523,
323,
5602,
430,
279,
4156,
13587,
574,
289,
677,
9894,
13,
3277,
358,
10717,
311,
19874,
11,
358,
11352,
430,
420,
574,
1606,
832,
315,
279,
1403,
49939,
430,
10187,
279,
13587,
304,
574,
8208,
13,
358,
7846,
956,
1505,
433,
12660,
14373,
11,
779,
358,
1940,
660,
389,
1203,
449,
264,
289,
21046,
398,
4156,
13587,
13,
358,
1903,
433,
11,
719,
358,
2751,
810,
315,
459,
39448,
26308,
1109,
358,
-100
] |
A blender on high. Wow! Best description I have ever heard for my manic mind. I'm going to steal that one!
Losing friends, hurting others, getting hurt yourself. Collateral damage from mental illness. We share our pain without meaning to.
I always lose friends. My mom still has friends from grade school. Sometimes I look at her and wonder how I came from her. But, I do have a sister who is just like me. It's nice to have one person who gets you.
But a family that has this kind of illness can also learn love, compassion and forgiveness. One granddaughter of mine has OCD. Her sisters are kind and understanding of people with mental illnesses. | {
"redpajama_set_name": "RedPajamaC4"
} | 2,691 | [
128000,
32,
62895,
389,
1579,
13,
46817,
0,
7252,
4096,
358,
617,
3596,
6755,
369,
856,
70222,
4059,
13,
358,
2846,
2133,
311,
27669,
430,
832,
4999,
43,
14759,
4885,
11,
48389,
3885,
11,
3794,
13194,
6261,
13,
13201,
19715,
5674,
505,
10723,
17563,
13,
1226,
4430,
1057,
6784,
2085,
7438,
311,
627,
40,
2744,
9229,
4885,
13,
3092,
3450,
2103,
706,
4885,
505,
12239,
2978,
13,
18156,
358,
1427,
520,
1077,
323,
5895,
1268,
358,
3782,
505,
1077,
13,
2030,
11,
358,
656,
617,
264,
13219,
889,
374,
1120,
1093,
757,
13,
1102,
596,
6555,
311,
617,
832,
1732,
889,
5334,
499,
627,
4071,
264,
3070,
430,
706,
420,
3169,
315,
17563,
649,
1101,
4048,
3021,
11,
30481,
323,
53150,
13,
3861,
92490,
315,
10705,
706,
99024
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
32,
62895,
389,
1579,
13,
46817,
0,
7252,
4096,
358,
617,
3596,
6755,
369,
856,
70222,
4059,
13,
358,
2846,
2133,
311,
27669,
430,
832,
4999,
43,
14759,
4885,
11,
48389,
3885,
11,
3794,
13194,
6261,
13,
13201,
19715,
5674,
505,
10723,
17563,
13,
1226,
4430,
1057,
6784,
2085,
7438,
311,
627,
40,
2744,
9229,
4885,
13,
3092,
3450,
2103,
706,
4885,
505,
12239,
2978,
13,
18156,
358,
1427,
520,
1077,
323,
5895,
1268,
358,
3782,
505,
1077,
13,
2030,
11,
358,
656,
617,
264,
13219,
889,
374,
1120,
1093,
757,
13,
1102,
596,
6555,
311,
617,
832,
1732,
889,
5334,
499,
627,
4071,
264,
3070,
430,
706,
420,
3169,
315,
17563,
649,
1101,
4048,
3021,
11,
30481,
323,
53150,
13,
3861,
92490,
315,
10705,
706,
99024,
-100
] |
Aahw… this Monstera was exchanged for a younger one. Well, she is in our asylum now and guess what!
She just needs some light, warmth, and a cocktail (…of water and plant food). Then this middle aged lady will find a new owner who can handle her. | {
"redpajama_set_name": "RedPajamaC4"
} | 5,321 | [
128000,
32,
1494,
86,
1981,
420,
3206,
267,
2473,
574,
48501,
369,
264,
14992,
832,
13,
8489,
11,
1364,
374,
304,
1057,
33270,
1457,
323,
8101,
1148,
4999,
8100,
1120,
3966,
1063,
3177,
11,
41463,
11,
323,
264,
41010,
320,
1981,
1073,
3090,
323,
6136,
3691,
570,
5112,
420,
6278,
20330,
17240,
690,
1505,
264,
502,
6506,
889,
649,
3790,
1077,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
32,
1494,
86,
1981,
420,
3206,
267,
2473,
574,
48501,
369,
264,
14992,
832,
13,
8489,
11,
1364,
374,
304,
1057,
33270,
1457,
323,
8101,
1148,
4999,
8100,
1120,
3966,
1063,
3177,
11,
41463,
11,
323,
264,
41010,
320,
1981,
1073,
3090,
323,
6136,
3691,
570,
5112,
420,
6278,
20330,
17240,
690,
1505,
264,
502,
6506,
889,
649,
3790,
1077,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
The video shows how the quality of building planning and construction execution can be ensured and improved. Combining modular planning and integration planning is described using the example of a project for F. Hoffmann-La Roche AG. The application of Building Information Modeling (BIM) allows for flexibility in building configuration. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,198 | [
128000,
791,
2835,
5039,
1268,
279,
4367,
315,
4857,
9293,
323,
8246,
11572,
649,
387,
59754,
323,
13241,
13,
23262,
5859,
44993,
9293,
323,
18052,
9293,
374,
7633,
1701,
279,
3187,
315,
264,
2447,
369,
435,
13,
43822,
18022,
95016,
12093,
1557,
15432,
13,
578,
3851,
315,
17283,
8245,
77349,
320,
33,
1829,
8,
6276,
369,
25152,
304,
4857,
6683,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
791,
2835,
5039,
1268,
279,
4367,
315,
4857,
9293,
323,
8246,
11572,
649,
387,
59754,
323,
13241,
13,
23262,
5859,
44993,
9293,
323,
18052,
9293,
374,
7633,
1701,
279,
3187,
315,
264,
2447,
369,
435,
13,
43822,
18022,
95016,
12093,
1557,
15432,
13,
578,
3851,
315,
17283,
8245,
77349,
320,
33,
1829,
8,
6276,
369,
25152,
304,
4857,
6683,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
After a well-deserved break, we are on the verge of a new trainig season (next Monday to be exact).
So this is the right time to renew your equipment, go see our sponsor Neon Skates. Do as we do, and go shopping that you need for this new season! They have just what you need to be at the top: protection's kits, wheels, decks or shoes to satisfy your needs. They are not in rest of great tips too!
Take the time to go visit their page.
Good season to you all. | {
"redpajama_set_name": "RedPajamaC4"
} | 2,492 | [
128000,
6153,
264,
1664,
25520,
2841,
1464,
11,
584,
527,
389,
279,
59818,
315,
264,
502,
5542,
343,
3280,
320,
3684,
7159,
311,
387,
4839,
4390,
4516,
420,
374,
279,
1314,
892,
311,
14195,
701,
7241,
11,
733,
1518,
1057,
25438,
78064,
4923,
988,
13,
3234,
439,
584,
656,
11,
323,
733,
12185,
430,
499,
1205,
369,
420,
502,
3280,
0,
2435,
617,
1120,
1148,
499,
1205,
311,
387,
520,
279,
1948,
25,
9313,
596,
32596,
11,
23529,
11,
30881,
477,
15653,
311,
27651,
701,
3966,
13,
2435,
527,
539,
304,
2800,
315,
2294,
10631,
2288,
4999,
18293,
279,
892,
311,
733,
4034,
872,
2199,
627,
15571,
3280,
311,
499,
682,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
6153,
264,
1664,
25520,
2841,
1464,
11,
584,
527,
389,
279,
59818,
315,
264,
502,
5542,
343,
3280,
320,
3684,
7159,
311,
387,
4839,
4390,
4516,
420,
374,
279,
1314,
892,
311,
14195,
701,
7241,
11,
733,
1518,
1057,
25438,
78064,
4923,
988,
13,
3234,
439,
584,
656,
11,
323,
733,
12185,
430,
499,
1205,
369,
420,
502,
3280,
0,
2435,
617,
1120,
1148,
499,
1205,
311,
387,
520,
279,
1948,
25,
9313,
596,
32596,
11,
23529,
11,
30881,
477,
15653,
311,
27651,
701,
3966,
13,
2435,
527,
539,
304,
2800,
315,
2294,
10631,
2288,
4999,
18293,
279,
892,
311,
733,
4034,
872,
2199,
627,
15571,
3280,
311,
499,
682,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
A 33-year-old Pinchbeck man snatched £20 from the till of a Spalding store when he went to pay for a fizzy drink.
Matthew David Hall, of Walpole Drive, but who was of no fixed address at the time, admitted the theft at Boston Magistrates' Court.
The court heard he grabbed two £10 notes from the till, which had been opened to take his payment, when he went to pay at Heron Foods in Sheep Market on January 15. He then ran away.
However, said Paul Wood prosecuting, Hall had been recognised by staff and he was arrested later - still with one of the £10 notes.
He told police he had stolen the money to buy drugs, said Mr Wood.
Mitigating, Tony Davies said Hall had lost his job and his accommodation and had broken up with his girlfriend at the time of the theft.
Hall was fined £80 and ordered to pay £10 compensation. | {
"redpajama_set_name": "RedPajamaC4"
} | 9,384 | [
128000,
32,
220,
1644,
4771,
6418,
17929,
331,
55177,
893,
4224,
35344,
7083,
508,
505,
279,
12222,
315,
264,
3165,
4852,
287,
3637,
994,
568,
4024,
311,
2343,
369,
264,
79311,
4341,
7172,
627,
50988,
6941,
11166,
11,
315,
14916,
69172,
16542,
11,
719,
889,
574,
315,
912,
8521,
2686,
520,
279,
892,
11,
16584,
279,
28483,
520,
10406,
7023,
94200,
6,
7301,
627,
791,
5590,
6755,
568,
30418,
1403,
7083,
605,
8554,
505,
279,
12222,
11,
902,
1047,
1027,
9107,
311,
1935,
813,
8323,
11,
994,
568,
4024,
311,
2343,
520,
6385,
263,
40160,
304,
84008,
8152,
389,
6186,
220,
868,
13,
1283,
1243,
10837,
3201,
627,
11458,
11,
1071,
7043,
12404,
98274,
11,
11166,
1047,
1027,
39764,
555,
5687,
323,
568,
574,
12800,
3010,
482,
2103
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
32,
220,
1644,
4771,
6418,
17929,
331,
55177,
893,
4224,
35344,
7083,
508,
505,
279,
12222,
315,
264,
3165,
4852,
287,
3637,
994,
568,
4024,
311,
2343,
369,
264,
79311,
4341,
7172,
627,
50988,
6941,
11166,
11,
315,
14916,
69172,
16542,
11,
719,
889,
574,
315,
912,
8521,
2686,
520,
279,
892,
11,
16584,
279,
28483,
520,
10406,
7023,
94200,
6,
7301,
627,
791,
5590,
6755,
568,
30418,
1403,
7083,
605,
8554,
505,
279,
12222,
11,
902,
1047,
1027,
9107,
311,
1935,
813,
8323,
11,
994,
568,
4024,
311,
2343,
520,
6385,
263,
40160,
304,
84008,
8152,
389,
6186,
220,
868,
13,
1283,
1243,
10837,
3201,
627,
11458,
11,
1071,
7043,
12404,
98274,
11,
11166,
1047,
1027,
39764,
555,
5687,
323,
568,
574,
12800,
3010,
482,
2103,
-100
] |
Belgrade doesn't have Uber, but it does have the local version known as CarGo, which is likely the safest, cheapest and most convenient way to get across town and especially to or from the airport. Read more here.
As a result of a surprisingly small number of bridges, a bypass under construction, and the fact that a motorway runs almost through the centre of the city, there are no classic peak traffic periods, but instead, there are traffic jams on major interchanges almost all the day round. Belgraders as a rule drive fast and change lanes abruptly without signalling, and they do not suffer slower drivers gladly. A yellow line which marks the rightmost lane actually means the lane is reserved for public transport and taxis. Do not come too close to the curb, because some mysterious bandits seem to be operating outside the city centre and targeting manhole lids, so you run the risk of your tyre hitting the hole. In summary, if you have little penchant for the Dakar Rally experience, you have better abandon the idea of driving round Belgrade. After all, the best way to get to know a city is on foot.
If you don't mind public transport, we recommend hopping on a bus or trolley in order to truly experience candid Belgrade. All public transport use a Bus Plus card payment system, so it would be smart to invest in one before hopping on a bus, in case of the rare occurrence of controllers. A lot of the locals don't even bother using this payment system though and talk their way out of paying the fine. Foreigners however, might have even be overcharged for riding without a ticket, so watch out.
Taxis in Belgrade are comparatively cheap to the rest of the world, but only if you choose wisely. Avoid getting into "unregistered" taxis (with plain white taxi signs) at all costs, as they are notorious for ripping off their customers more than ten times the usual price. To stay on the safe side, always call a taxi to ensure that they are valid. Our recommendations are Lux Taxi, Pink Taxi and Plavi Taxi. Most vehicles don't offer card payments, so make sure to ask for one while booking.
Parking presents a problem. There are very few parking garages, and only a few companies can boast the luxury of private parking. To compound the mess, the Old Town is divided into three parking zones: red zone (one-hour parking limit), yellow (two-hour) and green (three-hour). You can pay for parking by filling out a parking coupon for the relevant zone, available at kiosks with instructions in English overleaf. Another way to pay for parking is to send an SMS message with the number of licence plates to 9111 for Zone 1, 9112 for Zone 2 and 9113 for Zone 3. You will receive a confirmation message in Serbian, so it might be safer to use the parking coupon, in case you were rejected. If you opt for parking in a parking garage, no parking limit applies.
You may notice that some local drivers have a habit of parking their cars with blithe insouciance in the middle of the street, even in the yellow lane, reserved for public transport, without suffering any consequences. This occurs with annoying regularity on Nušićeva, Kraljice Marije, 27. Marta, Svetogorska and Bulevar Kralja Aleksandra among others. We do not advise you to follow their example because it is an ugly habit, posing a problem for other drivers.
Belgrade does not have an underground railway system, and it does not look as if it is going to get one soon (although it has one of the deepest tube stations in Europe, at 42m below ground level). City transport comprises buses, trams and trolley buses. Buses are operated by a public utility company controlled by the city council and a number of private companies, which accounts for the differences in shape, colour and age of the buses out on the streets.
The best option for paying are the newly launched BusPlus tickets, which cost 100 dinars and are good for 75 minutes with unlimited connections on buses and trams. There are also single-ride tickets for 72 dinars, or you can buy a fare on board from the driver for 140 dinars. You have to validate your ticket once you get on board.
A ride without a valid ticket could cost you a 3000 dinar fine. Public transport runs (roughly) from 04:30 to 23:30. During night time, buses run at 1-hour intervals. Night buses depart from special stops on Trg Republike towards other parts of the city. The night fare is 100 dinars, available on board. You are advised to avoid trams if you are in a hurry, because one broken tram blocks an entire line (or two), and this invariably happens right in the middle of two stops, in pouring rain.
Like most things in Belgrade, taxis have become a bit more modern and reliable in recent years, and are still quite cheap by western standards. Like anywhere in the world there are a few bad apples who might try to run up the fare on you or engage in some other dubious activity. However, from our personal experience the average Serbian taxi driver will go out of his way to get you where you're going as quickly as possible, whilst expertly negotiating Belgrade's often chaotic traffic. Most drivers are not exactly fluent in English, but are more than happy to chat with passengers as much as possible – and any Serbian vocabulary proffered on your part is sure to impress. Tips aren't the norm, but with the low fares and frequent en route entertainment we recommend paying it forward as much as your budget allows. All reputable companies are part of the local Taxi Association, with standard fares set at 170din flag drop, 65/85/130din per kilometre depending on the time of day, and 750din per hour of wait time. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,414 | [
128000,
22404,
7082,
3250,
956,
617,
28712,
11,
719,
433,
1587,
617,
279,
2254,
2373,
3967,
439,
3341,
11087,
11,
902,
374,
4461,
279,
62844,
11,
43149,
323,
1455,
17125,
1648,
311,
636,
4028,
6424,
323,
5423,
311,
477,
505,
279,
17149,
13,
4557,
810,
1618,
627,
2170,
264,
1121,
315,
264,
29392,
2678,
1396,
315,
40073,
11,
264,
31818,
1234,
8246,
11,
323,
279,
2144,
430,
264,
9048,
3195,
8640,
4661,
1555,
279,
12541,
315,
279,
3363,
11,
1070,
527,
912,
11670,
16557,
9629,
18852,
11,
719,
4619,
11,
1070,
527,
9629,
90398,
389,
3682,
958,
19926,
4661,
682,
279,
1938,
4883,
13,
7984,
911,
6527,
439,
264,
6037,
6678,
5043,
323,
2349,
34125,
60845,
2085,
91977,
11,
323,
814,
656,
539,
7831,
29493,
12050,
71950,
13
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
22404,
7082,
3250,
956,
617,
28712,
11,
719,
433,
1587,
617,
279,
2254,
2373,
3967,
439,
3341,
11087,
11,
902,
374,
4461,
279,
62844,
11,
43149,
323,
1455,
17125,
1648,
311,
636,
4028,
6424,
323,
5423,
311,
477,
505,
279,
17149,
13,
4557,
810,
1618,
627,
2170,
264,
1121,
315,
264,
29392,
2678,
1396,
315,
40073,
11,
264,
31818,
1234,
8246,
11,
323,
279,
2144,
430,
264,
9048,
3195,
8640,
4661,
1555,
279,
12541,
315,
279,
3363,
11,
1070,
527,
912,
11670,
16557,
9629,
18852,
11,
719,
4619,
11,
1070,
527,
9629,
90398,
389,
3682,
958,
19926,
4661,
682,
279,
1938,
4883,
13,
7984,
911,
6527,
439,
264,
6037,
6678,
5043,
323,
2349,
34125,
60845,
2085,
91977,
11,
323,
814,
656,
539,
7831,
29493,
12050,
71950,
13,
-100
] |
Özkan Hidrolik, founded in Izmir in 1991. Gave a start to business with producing high-pressure hydraulic hoses, cylinder machines for industrial machinery, maintenance-repair and technical services.
In 2005, our company became Aegean region distributor of Hidrokontrol, which is mainly working on hydraulic project and system design in the region.
We opened our own cylinder factory in 2006, Özkan Hidrolik focused on manufacturing and revision of heavy duty cylinders in line with the demands of the ports, factories, iron and steel companies and other customers in the region.
Since 2009, our company has fulfilled the requirements of ISO 9001: 2015 quality management system and has been adopted by all the staff.
In 2015, we managed to get the distributorships of two respected Italian manufacturers: Alfagomma SPA on hose and hose joints and Vivola SRL, who manufactures gear pump, motor and flow divider with high quality at Europe.
Also in 2017, Özkan Hidrolik became an authorised distributor of worlds famous Japanese hydraulic equipment manufacturer Yuken Hydraulics who manufactures hydraulic pumps, motors, valves and their all accessories.
In the first quarter of 2018, by being distributor of italian pneumatic equipment manufacturer A.P.I. - Advanced Pneumatic Industries, we have expanded our pneumatic product range.
Control valves, proportional controls, gear pumps and motors, fixed and variable displacement piston pumps and motors, fixed and variable displacement pneumatic pumps, closed loop pumps, hand pumps, orbit motors, radial piston motors, high pressure water pumps, reducers, cable drums, mechanical / electromagnetic clutches, coolers, attachments, valves, filters, hoses, shock absorbers, chrome-plated steel rods, winches, slewing rings, rotary tables, steering motors and reducers, electric and hydraulic oil distributors, undercarriages, rotators, mini power units, pneumatic cylinders, pneumatic hoses, pneumatic fasteners, electronic cards, electronic moment control systems, radio control systems, electronic radar collision avoidance system, induction miller, honed pipes, cylinders, pipe fittings, hydro-pneumatic pumps, pneumatic valves, conditioners, pneumatic cylinders systems, etc. | {
"redpajama_set_name": "RedPajamaC4"
} | 6,418 | [
128000,
64461,
89,
8826,
473,
307,
299,
7792,
11,
18538,
304,
48923,
20531,
304,
220,
2550,
16,
13,
480,
525,
264,
1212,
311,
2626,
449,
17843,
1579,
89561,
44175,
96936,
11,
35664,
12933,
369,
13076,
26953,
11,
13709,
5621,
12959,
323,
11156,
3600,
627,
644,
220,
1049,
20,
11,
1057,
2883,
6244,
90895,
713,
276,
5654,
44168,
315,
473,
307,
299,
40820,
1098,
11,
902,
374,
14918,
3318,
389,
44175,
2447,
323,
1887,
2955,
304,
279,
5654,
627,
1687,
9107,
1057,
1866,
35664,
8803,
304,
220,
1049,
21,
11,
103867,
8826,
473,
307,
299,
7792,
10968,
389,
15266,
323,
24493,
315,
8987,
14523,
75421,
304,
1584,
449,
279,
18651,
315,
279,
20946,
11,
35159,
11,
11245,
323,
9699,
5220,
323,
1023,
6444,
304,
279,
5654,
627,
12834,
220
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
64461,
89,
8826,
473,
307,
299,
7792,
11,
18538,
304,
48923,
20531,
304,
220,
2550,
16,
13,
480,
525,
264,
1212,
311,
2626,
449,
17843,
1579,
89561,
44175,
96936,
11,
35664,
12933,
369,
13076,
26953,
11,
13709,
5621,
12959,
323,
11156,
3600,
627,
644,
220,
1049,
20,
11,
1057,
2883,
6244,
90895,
713,
276,
5654,
44168,
315,
473,
307,
299,
40820,
1098,
11,
902,
374,
14918,
3318,
389,
44175,
2447,
323,
1887,
2955,
304,
279,
5654,
627,
1687,
9107,
1057,
1866,
35664,
8803,
304,
220,
1049,
21,
11,
103867,
8826,
473,
307,
299,
7792,
10968,
389,
15266,
323,
24493,
315,
8987,
14523,
75421,
304,
1584,
449,
279,
18651,
315,
279,
20946,
11,
35159,
11,
11245,
323,
9699,
5220,
323,
1023,
6444,
304,
279,
5654,
627,
12834,
220,
-100
] |
Want to partner, contribute an article, or have a question? Please feel free to contact at us at one of the methods below.
We are currently accepting advertising and sponsorship opportunities, please download our media kit below for inquires. | {
"redpajama_set_name": "RedPajamaC4"
} | 586 | [
128000,
29923,
311,
8427,
11,
17210,
459,
4652,
11,
477,
617,
264,
3488,
30,
5321,
2733,
1949,
311,
3729,
520,
603,
520,
832,
315,
279,
5528,
3770,
627,
1687,
527,
5131,
25694,
13172,
323,
55531,
10708,
11,
4587,
4232,
1057,
3772,
16530,
3770,
369,
304,
18164,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] | [
29923,
311,
8427,
11,
17210,
459,
4652,
11,
477,
617,
264,
3488,
30,
5321,
2733,
1949,
311,
3729,
520,
603,
520,
832,
315,
279,
5528,
3770,
627,
1687,
527,
5131,
25694,
13172,
323,
55531,
10708,
11,
4587,
4232,
1057,
3772,
16530,
3770,
369,
304,
18164,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Everyone has a website these days: But how many of them really work and produce income and results?
It's all too easy to have a website built and then expect to get new business. But there is so much competition out there how do you get your website seen? Then once people visit it how do you attract them s clients?
Website traffic is easy. I can get thousands of visitors to any website with ease. However getting targeted traffic is harder. It takes time and effort. And targeted traffic is the key to success.
A website is like a shop window. If you had a shop in your local high street for your business would it work? Chances are no. There may be thousands of people passing by but how many are interested in what you offer – at that time?
Your website needs to be visible to people at the exact moment when they are looking for an offer like yours. So if you sell holiday lodges in North Wales you need people to find you when they are looking for a holiday lodge in Wales.
This means you need to be on the front page of the search results when people put in the relevant terms. But not everyone can be on the front page – there are only 10 spots. Luckily there are other ways to get hot leads. These involve social media, PR, articles, blogs and other forms of inbound marketing.
You may have noticed, as many of our clients have, a fall off in the returns from print advertising. It's been in decline for years. I remember when I could put an advert in the Mail on Sunday or the News of the World and the phone would ring all day and Monday. Happy days; but they are no more.
80% of people research purchases online before actually buying. So if you place an advert in the paper people may like the idea: They will visit your website or make an enquiry: But they will also research online your competition. So you need to have a strong presence and reputation online to still stand a chance at this new business. At the end of the day a combined approach is what is needed.
Once you get people to your website you need to capture their data. Simple data catchment forms can have a huge effect. Most people will only visit your website once. So while they are there get their email and name. Then you can send them emails and engage with them. In this way you build your reputation and give people reasons to make their purchase from you and not your competition.
Social media now offers your brand the chance to engage with prospects and customers. You can offer them great service and value. And in this way you will be the natural choice when it comes time for their next booking or purchase.
Marketing now must be a constant stream of actions and engagement. In this way your business will be the first choice when it comes time to book. Best of all social media allows your audience to recommend you to their network, thus your offer spreads organically. Personal recommendation is more powerful now than ever before. Reputation is key to this and businesses need to have a plan to manage this online.
CR4L charges on results: If we don't get you new business you don't pay. For a more information visit the CR4L website or call Alex for a chat.
· Is your website working properly?
· Do all the links work?
· How is it ranked?
· What can you do to make it better for no cost?
Conveniently enough you can go to the Bitroad return and simply just click their "Merchant Tools" tab and get your web page installation to agree to Bitcoins nowadays. It's quick simple and easy it increases your organization's versatility when it comes to getting expenses. | {
"redpajama_set_name": "RedPajamaC4"
} | 1,877 | [
128000,
34124,
706,
264,
3997,
1521,
2919,
25,
2030,
1268,
1690,
315,
1124,
2216,
990,
323,
8356,
8070,
323,
3135,
5380,
2181,
596,
682,
2288,
4228,
311,
617,
264,
3997,
5918,
323,
1243,
1755,
311,
636,
502,
2626,
13,
2030,
1070,
374,
779,
1790,
10937,
704,
1070,
1268,
656,
499,
636,
701,
3997,
3970,
30,
5112,
3131,
1274,
4034,
433,
1268,
656,
499,
9504,
1124,
274,
8403,
5380,
31151,
9629,
374,
4228,
13,
358,
649,
636,
9214,
315,
15613,
311,
904,
3997,
449,
14553,
13,
4452,
3794,
17550,
9629,
374,
16127,
13,
1102,
5097,
892,
323,
5149,
13,
1628,
17550,
9629,
374,
279,
1401,
311,
2450,
627,
32,
3997,
374,
1093,
264,
8221,
3321,
13,
1442,
499,
1047,
264,
8221,
304,
701,
2254,
1579,
8761,
369,
701,
2626
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
34124,
706,
264,
3997,
1521,
2919,
25,
2030,
1268,
1690,
315,
1124,
2216,
990,
323,
8356,
8070,
323,
3135,
5380,
2181,
596,
682,
2288,
4228,
311,
617,
264,
3997,
5918,
323,
1243,
1755,
311,
636,
502,
2626,
13,
2030,
1070,
374,
779,
1790,
10937,
704,
1070,
1268,
656,
499,
636,
701,
3997,
3970,
30,
5112,
3131,
1274,
4034,
433,
1268,
656,
499,
9504,
1124,
274,
8403,
5380,
31151,
9629,
374,
4228,
13,
358,
649,
636,
9214,
315,
15613,
311,
904,
3997,
449,
14553,
13,
4452,
3794,
17550,
9629,
374,
16127,
13,
1102,
5097,
892,
323,
5149,
13,
1628,
17550,
9629,
374,
279,
1401,
311,
2450,
627,
32,
3997,
374,
1093,
264,
8221,
3321,
13,
1442,
499,
1047,
264,
8221,
304,
701,
2254,
1579,
8761,
369,
701,
2626,
-100
] |
Law on Public Corporations
Local water districts as corporations
The Constitution recognizes two classes of corporations. The first refers to private corporations created under a general law. The second refers to government-owned or controlled corporations created by special charters. Section 16, Article XII of the Constitution provides:
Sec. 16. The Congress shall not, except by general law, provide for the formation, organization, or regulation of private corporations. Government-owned or controlled corporations may be created or established by special charters in the interest of the common good and subject to the test of economic viability.
The Constitution emphatically prohibits the creation of private corporations except by a general law applicable to all citizens. The purpose of this constitutional provision is to ban private corporations created by special charters, which historically gave certain individuals, families or groups special privileges denied to other citizens.
In short, Congress cannot enact a law creating a private corporation with a special charter. Such legislation would be unconstitutional. Private corporations may exist only under a general law. If the corporation is private, it must necessarily exist under a general law. Stated differently, only corporations created under a general law can qualify as private corporations.Under existing laws, that general law is the Corporation Code, except that the Cooperative Code governs the incorporation of cooperatives.
The Constitution authorizes Congress to create government-owned or controlled corporations through special charters. Since private corporations cannot have special charters, it follows that Congress can create corporations with special charters only if such corporations are government-owned or controlled.
Obviously, local water districts (LWDs) are NOT private corporations because they are not created under the Corporation Code. LWDs are not registered with the Securities and Exchange Commission. Section 14 of the Corporation Code states that [A]ll corporations organized under this code shall file with the Securities and Exchange Commission articles of incorporation x x x. LWDs have no articles of incorporation, no incorporators and no stockholders or members. There are no stockholders or members to elect the board directors of LWDs as in the case of all corporations registered with the Securities and Exchange Commission. The local mayor or the provincial governor appoints the directors of LWDs for a fixed term of office.
The Supreme Court has ruled that LWDs are NOT created under the Corporation Code, thus: From the foregoing pronouncement, it is clear that what has been excluded from the coverage of the CSC are those corporations created pursuant to the Corporation Code. Significantly, petitioners are not created under the said code, but on the contrary, they were created pursuant to a special law and are governed primarily by its provision.
LWDs exist by virtue of PD 198, which constitutes their special charter. Since under the Constitution only government-owned or controlled corporations may have special charters, LWDs can validly exist only if they are government-owned or controlled. To claim that LWDs are private corporations with a special charter is to admit that their existence is constitutionally infirm.
Unlike private corporations, which derive their legal existence and power from the Corporation Code, LWDs derive their legal existence and power from PD 198. Sections 6 and 25 of PD 198 provide:
Section 6. Formation of District. This Act is the source of authorization and power to form and maintain a district. For purposes of this Act, a district shall be considered as a quasi-public corporation performing public service and supplying public wants. As such, a district shall exercise the powers, rights and privileges given to private corporations under existing laws, in addition to the powers granted in, and subject to such restrictions imposed, under this Act.
Clearly, LWDs exist as corporations only by virtue of PD 198, which expressly confers on LWDs corporate powers. Section 6 of PD 198 provides that LWDs shall exercise the powers, rights and privileges given to private corporations under existing laws. Without PD 198, LWDs would have no corporate powers. Thus, PD 198 constitutes the special enabling charter of LWDs. The ineluctable conclusion is that LWDs are government-owned and controlled corporations with a special charter.
The phrase government-owned and controlled corporations with original charters means GOCCs created under special laws and not under the general incorporation law. There is no difference between the term original charters and special charters. The Court clarified this in National Service Corporation v. NLRC by citing the deliberations in the Constitutional Commission, as follows:
Petitioner further contends that a law must create directly and explicitly a GOCC in order that it may have an original charter. In short, petitioner argues that one special law cannot serve as enabling law for several GOCCs but only for one GOCC. Section 16, Article XII of the Constitution mandates that Congress shall not, except by general law, provide for the creation of private corporations. Thus, the Constitution prohibits one special law to create one private corporation, requiring instead a general law to create private corporations. In contrast, the same Section 16 states that Government-owned or controlled corporations may be created or established by special charters. Thus, the Constitution permits Congress to create a GOCC with a special charter. There is, however, no prohibition on Congress to create several GOCCs of the same class under one special enabling charter.
The rationale behind the prohibition on private corporations having special charters does not apply to GOCCs. There is no danger of creating special privileges to certain individuals, families or groups if there is one special law creating each GOCC. Certainly, such danger will not exist whether one special law creates one GOCC, or one special enabling law creates several GOCCs. Thus, Congress may create GOCCs either by special charters specific to each GOCC, or by one special enabling charter applicable to a class of GOCCs, like PD 198 which applies only to LWDs.
Petitioner also contends that LWDs are private corporations because Section 6 of PD 198 declares that LWDs shall be considered quasi-public in nature. Petitioners rationale is that only private corporations may be deemed quasi-public and not public corporations. Put differently, petitioner rationalizes that a public corporation cannot be deemed quasi-public because such corporation is already public. Petitioner concludes that the term quasi-public can only apply to private corporations. Petitioners argument is inconsequential.
Petitioner forgets that the constitutional criterion on the exercise of COA's audit jurisdiction depends on the government's ownership or control of a corporation. The nature of the corporation, whether it is private, quasi-public, or public is immaterial.
The Constitution vests in the COA audit jurisdiction over government-owned and controlled corporations with original charters, as well as government-owned or controlled corporations without original charters. GOCCs with original charters are subject to COA pre-audit, while GOCCs without original charters are subject to COA post-audit. GOCCs without original charters refer to corporations created under the Corporation Code but are owned or controlled by the government. The nature or purpose of the corporation is not material in determining COAs audit jurisdiction. Neither is the manner of creation of a corporation, whether under a general or special law.
The determining factor of COAs audit jurisdiction is government ownership or control of the corporation. In Philippine Veterans Bank Employees Union-NUBE v. Philippine Veterans Bank, the Court even ruled that the criterion of ownership and control is more important than the issue of original charter, thus:
This point is important because the Constitution provides in its Article IX-B, Section 2(1) that the Civil Service embraces all branches, subdivisions, instrumentalities, and agencies of the Government, including government-owned or controlled corporations with original charters. As the Bank is not owned or controlled by the Government although it does have an original charter in the form of R.A. No. 3518, it clearly does not fall under the Civil Service and should be regarded as an ordinary commercial corporation. Section 28 of the said law so provides. The consequence is that the relations of the Bank with its employees should be governed by the labor laws, under which in fact they have already been paid some of their claims.
Certainly, the government owns and controls LWDs. The government organizes LWDs in accordance with a specific law, PD 198. There is no private party involved as co-owner in the creation of an LWD. Just prior to the creation of LWDs, the national or local government owns and controls all their assets. The government controls LWDs because under PD 198 the municipal or city mayor, or the provincial governor, appoints all the board directors of an LWD for a fixed term of six years. The board directors of LWDs are not co-owners of the LWDs.LWDs have no private stockholders or members. The board directors and other personnel of LWDs are government employees subject to civil service laws and anti-graft laws.
While Section 8 of PD 198 states that [N]o public official shall serve as director of an LWD, it only means that the appointees to the board of directors of LWDs shall come from the private sector. Once such private sector representatives assume office as directors, they become public officials governed by the civil service law and anti-graft laws. Otherwise, Section 8 of PD 198 would contravene Section 2(1), Article IX-B of the Constitution declaring that the civil service includes government-owned or controlled corporations with original charters.
If LWDs are neither GOCCs with original charters nor GOCCs without original charters, then they would fall under the term agencies or instrumentalities of the government and thus still subject to COAs audit jurisdiction. However, the stark and undeniable fact is that the government owns LWDs. Section 45 of PD 198 recognizes government ownership of LWDs when Section 45 states that the board of directors may dissolve an LWD only on the condition that another public entity has acquired the assets of the district and has assumed all obligations and liabilities attached thereto. The implication is clear that an LWD is a public and not a private entity.
Petitioner does not allege that some entity other than the government owns or controls LWDs. Instead, petitioner advances the theory that the Water Districts owner is the District itself. Assuming for the sake of argument that an LWD is self-owned, as petitioner describes an LWD, the government in any event controls all LWDs. First, government officials appoint all LWD directors to a fixed term of office. Second, any per diem of LWD directors in excess of P50 is subject to the approval of the Local Water Utilities Administration, and directors can receive no other compensation for their services to the LWD. Third, the Local Water Utilities Administration can require LWDs to merge or consolidate their facilities or operations.This element of government control subjects LWDs to COAs audit jurisdiction.
Petitioner argues that upon the enactment of PD 198, LWDs became private entities through the transfer of ownership of water facilities from local government units to their respective water districts as mandated by PD 198. Petitioner is grasping at straws. Privatization involves the transfer of government assets to a private entity. Petitioner concedes that the owner of the assets transferred under Section 6 (c) of PD 198 is no other than the LWD itself. The transfer of assets mandated by PD 198 is a transfer of the water systems facilities managed, operated by or under the control of such city, municipality or province to such (water) district. In short, the transfer is from one government entity to another government entity. PD 198 is bereft of any indication that the transfer is to privatize the operation and control of water systems. (G.R. No. 147402. January 14, 2004)
Insurance proceeds as part of gross estate
Gross estate; vanishing deduction
Estate tax; gratuitous transfers to heirs before d...
Estate tax; transfer in contemplation of death
Estate tax; resident alien decedents
Theories on imposition of estate tax
Characteristics of estate tax
Estate tax: not tax on property
Corporation, defined
Composition of the gross estate
Law governing estate taxation
New Rate of Estate Tax (RR 12-2018)
What is inheritance tax?
Insurance proceeds as part of the gross estate
Value of gross estate for tax purposes
Principle of mobilia sequuntur personam
33 things about estate, donor's tax under TRAIN law
What is estate tax?
Donations inter vivos, mortis causa subject to est...
Extension of time to pay estate taxes
Difference: donor's tax, estate tax
Transfer taxes, defined
Exception to the rule on formal offer of evidence
Principle of uniformity of evidence
Evidence, defined
Actionable? Promise to marry coaxes girl to have sex
Revised Corporation Code will surely become law
The concept of quasi-delicts in the Philippines
12 strict torts under the Civil Code
Intentional tort
Negligent tort
Graft court denies hospital arrest for 71yo accused
SSS suing 8,500 employers for nonpayment, etc.
New bill pushes for 6-week ROTC training in college
Senator: 33% of women experience physical, sexual ...
BIR should NOT tax health card benefits - senator
Gov't to tax alcohol more to afford universal heal...
New bill seeks to regulate speech therapists
Lawmaker to PNP: Hire mechanics to maintain 15,170...
Law dean: No lawyer needed for cases NOT above P300K
SC: Bus, airline, etc. workers must be kind, respe...
Law expert shames Cebu Pac for bad service
'PDP-Laban candidates to be funded by China'
Philippine gov't issues Boracay do's, dont's
New bill requires bigger number plates for motorbikes
All gov't workers to get more salary in 2019
2 experts say China-Philippines oil contract 'safe'
New bill to produce 150 new judges
AFP too weak to fight China re: island dispute
Sole proprietorship, partnership, joint venture, c...
PNRC as sui generis corporation
De facto corporation created by special law?
Davao-native Antonio may be next SC CJ
Can Congress create a private corporation via law?
Genossenschaft theory v. imprimatur doctrine
Corporation by prescription
Corporations: creatures of the State
Corporation, defined; legal, juridical personality
Modes of settling deceased's estate
Limited jurisdiction; special proceedings
6 differences: ordinary action, special proceeding
Rules: ordinary actions v. special proceedings
What are special proceedings?
China: Philippines must stop exercising ownership ...
New tax bill imposes additional P30 per proof liter
Locsin hits Palace: Why let China write contract t...
New bill mandates gov't to buy palay from local fa...
Solon wants Sep. 8 declared Virgin Mary Feast
SC punishes MTC judge for FB post re: Sereno ouster
Duterte to Xi: Make Philippines a province of China
BIR loses 1.1B tax case due to wrong service of LOA
Author predicted nearly 100% of Bar exam
Why lawyers matter - Marvic Leonen (TEDx)
Leonen: the poorest SC justice at P2.96M
Jardeleza: the richest SC justice at P261M
How to Improve Your Bar Exam Mindset - Above the Law
House OKs bill protecting 'kaliwete' students
Sen. Joel wants to protect OFWs
Gross inequality in the Philippine justice system
Senate OKs Palawan split into 3 provinces
SC: New lawyers should work hard, respect courts
Notes on venue and jurisdiction
23% of cases vs. police are rape of minors
Lawyer: PRRD admin can't censor 'Ang Probinsyano'
Duterte: China will help me stay in power
36 Senate committees, their powers
Senator: More decent, cheap houses for poor families
New bill orders LGUs to address traffic problems, ...
Voters' decisions
What's gerrymandering?
Basics of election
VIDEO: Why police body cam should be mandatory
House: Stop using violent methods to discipline kids
SC revises Rule 140, creates 2 complaint offices
The 'wheelchair doctrine'
"PNP image in 'Ang Probinsyano' unfair to PRRD admin"
Senate oks bill to forgive tax arrears
Companies to abolish plastic bags; int'l environme... | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 3,055 | [
128000,
39166,
389,
3142,
11095,
811,
198,
7469,
3090,
27536,
439,
25341,
198,
791,
18039,
45799,
1403,
6989,
315,
25341,
13,
578,
1176,
19813,
311,
879,
25341,
3549,
1234,
264,
4689,
2383,
13,
578,
2132,
19813,
311,
3109,
29799,
477,
14400,
25341,
3549,
555,
3361,
9676,
388,
13,
11360,
220,
845,
11,
13659,
87915,
315,
279,
18039,
5825,
512,
8596,
13,
220,
845,
13,
578,
8151,
4985,
539,
11,
3734,
555,
4689,
2383,
11,
3493,
369,
279,
18488,
11,
7471,
11,
477,
19812,
315,
879,
25341,
13,
10423,
29799,
477,
14400,
25341,
1253,
387,
3549,
477,
9749,
555,
3361,
9676,
388,
304,
279,
2802,
315,
279,
4279,
1695,
323,
3917,
311,
279,
1296,
315,
7100,
68507,
627,
791,
18039,
13456,
7167,
59538,
279,
9886,
315,
879,
25341,
3734
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
39166,
389,
3142,
11095,
811,
198,
7469,
3090,
27536,
439,
25341,
198,
791,
18039,
45799,
1403,
6989,
315,
25341,
13,
578,
1176,
19813,
311,
879,
25341,
3549,
1234,
264,
4689,
2383,
13,
578,
2132,
19813,
311,
3109,
29799,
477,
14400,
25341,
3549,
555,
3361,
9676,
388,
13,
11360,
220,
845,
11,
13659,
87915,
315,
279,
18039,
5825,
512,
8596,
13,
220,
845,
13,
578,
8151,
4985,
539,
11,
3734,
555,
4689,
2383,
11,
3493,
369,
279,
18488,
11,
7471,
11,
477,
19812,
315,
879,
25341,
13,
10423,
29799,
477,
14400,
25341,
1253,
387,
3549,
477,
9749,
555,
3361,
9676,
388,
304,
279,
2802,
315,
279,
4279,
1695,
323,
3917,
311,
279,
1296,
315,
7100,
68507,
627,
791,
18039,
13456,
7167,
59538,
279,
9886,
315,
879,
25341,
3734,
-100
] |
Q: Sqlite3 error in adb command line I try to fetch call log details from android emulator with below adb command line.
adb shell
#cd /data/data/com.providers.android.contacts/databases
# sqlite3 contacts.db
SQLite version 3.5.0
Enter ".help" for instructions
sqlite> .dump
.dump
PRAGMA foreign_keys=OFF;
BEGIN TRANSACTION;
COMMIT;
I have an error that i don't know what happen.
This is error in sqlite3
PRAGMA foreign_keys=OFF;
BEGIN TRANSACTION;
COMMIT;
A: When you try to open a non-exisiting database file, SQLite will happily create an empty one.
Check that the file actually exists (e.g., with ls).
(On your phone, the call log might be in another file such as /data/data/com.sec.android.provider.logsprovider/databases/logs.db or /data/data/com.android.providers.contacts/databases/contacts2.db.)
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 4,698 | [
128000,
48,
25,
7372,
635,
18,
1493,
304,
83512,
3290,
1584,
358,
1456,
311,
7963,
1650,
1515,
3649,
505,
2151,
59616,
449,
3770,
83512,
3290,
1584,
627,
40691,
12811,
198,
2,
4484,
611,
695,
13469,
26149,
88279,
8307,
68575,
3529,
24760,
198,
2,
22775,
18,
19015,
7221,
198,
82872,
2373,
220,
18,
13,
20,
13,
15,
198,
6403,
6058,
8823,
1,
369,
11470,
198,
38142,
29,
662,
28760,
198,
28026,
198,
6616,
77268,
7362,
12919,
28,
28167,
280,
38688,
95023,
280,
8867,
18836,
401,
40,
617,
459,
1493,
430,
602,
1541,
956,
1440,
1148,
3621,
627,
2028,
374,
1493,
304,
22775,
18,
198,
6616,
77268,
7362,
12919,
28,
28167,
280,
38688,
95023,
280,
8867,
18836,
5322,
32,
25,
3277,
499,
1456,
311,
1825,
264,
2536,
10397,
285,
5977
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48,
25,
7372,
635,
18,
1493,
304,
83512,
3290,
1584,
358,
1456,
311,
7963,
1650,
1515,
3649,
505,
2151,
59616,
449,
3770,
83512,
3290,
1584,
627,
40691,
12811,
198,
2,
4484,
611,
695,
13469,
26149,
88279,
8307,
68575,
3529,
24760,
198,
2,
22775,
18,
19015,
7221,
198,
82872,
2373,
220,
18,
13,
20,
13,
15,
198,
6403,
6058,
8823,
1,
369,
11470,
198,
38142,
29,
662,
28760,
198,
28026,
198,
6616,
77268,
7362,
12919,
28,
28167,
280,
38688,
95023,
280,
8867,
18836,
401,
40,
617,
459,
1493,
430,
602,
1541,
956,
1440,
1148,
3621,
627,
2028,
374,
1493,
304,
22775,
18,
198,
6616,
77268,
7362,
12919,
28,
28167,
280,
38688,
95023,
280,
8867,
18836,
5322,
32,
25,
3277,
499,
1456,
311,
1825,
264,
2536,
10397,
285,
5977,
-100
] |
Q: Spring Boot with Embedded Mongo : Cannot assign requested address: JVM_Bind I am trying to setup a JUnit test for a Spring Boot with embedded Mongo & Kafka :-
@RunWith(SpringRunner.class)
@SpringBootTest(webEnvironment = SpringBootTest.WebEnvironment.NONE,
classes = {AccountingApplication.class})
@DataMongoTest
public class BaseEmbeddedTest {
@ClassRule
public static KafkaEmbedded embeddedKafka = new KafkaEmbedded(1, true);
@Autowired
private MongoTemplate mongoTemplate;
@Test
public void emptyTest(){
}
}
src/test/resources/application.yml :-
spring:
data:
mongodb:
port: 0
kafka:
bootstrap-servers: ${spring.embedded.kafka.brokers}
PROBLEM
Caused by: org.springframework.beans.BeanInstantiationException: Failed to instantiate [de.flapdoodle.embed.mongo.config.IMongodConfig]: Factory method 'embeddedMongoConfiguration' threw exception; nested exception is java.net.BindException: Cannot assign requested address: JVM_Bind
at org.springframework.beans.factory.support.SimpleInstantiationStrategy.instantiate(SimpleInstantiationStrategy.java:189)
at org.springframework.beans.factory.support.ConstructorResolver.instantiateUsingFactoryMethod(ConstructorResolver.java:588)
... 140 more
Caused by: java.net.BindException: Cannot assign requested address: JVM_Bind
at java.net.DualStackPlainSocketImpl.bind0(Native Method)
at java.net.DualStackPlainSocketImpl.socketBind(DualStackPlainSocketImpl.java:106)
at java.net.AbstractPlainSocketImpl.bind(AbstractPlainSocketImpl.java:387)
at java.net.PlainSocketImpl.bind(PlainSocketImpl.java:190)
at java.net.ServerSocket.bind(ServerSocket.java:375)
at java.net.ServerSocket.<init>(ServerSocket.java:237)
at de.flapdoodle.embed.process.runtime.Network.getFreeServerPort(Network.java:80)
at org.springframework.boot.autoconfigure.mongo.embedded.EmbeddedMongoAutoConfiguration.embeddedMongoConfiguration(EmbeddedMongoAutoConfiguration.java:147)
What am I doing wrong here ?
Version:-
dependencyManagementPluginVersion = '1.0.3.RELEASE'
springBootVersion = '1.5.6.RELEASE'
springCloudVersion = 'Dalston.SR2'
projectVersion = '0.0.1-SNAPSHOT'
javaVersion = 1.8
kotlinVersion = '1.1.4'
A: This annotation: @DataMongoTest causes Spring Boot to create an embedded Mongo instance. The exception messages tells us that the embedded Mongo instance cannot start because there is already a process running on the port it is trying to run on.
The embedded Mongo instance is configured by EmbeddedMongoAutoConfiguration and the strategy applied by Spring Boot - for port allocation - is as follows:
if configured Mongo port > 0 then
use the configured port
else
assign a random port
end
So, I suspect that your test context is configured with a non zero value for spring.data.mongodb.port. I know you posted your application.yml which implies that you are - correctly - assigning a zero value to spring.data.mongodb.port but if you put a breakpoint inside the EmbeddedMongoAutoConfiguration constructor and peek inside the properties parameter I think you'll see that the actual value in use by that configuration class is not zero. If the port value passed to EmbeddedMongoAutoConfiguration is actually zero but you are still getting the JVM_Bind error then that implies that this call: Network.getFreeServerPort(this.getHost()) is not returning a free port and that seems unlikely.
In order to fix this issue: as long as you configure your test context with spring.data.mongodb.port=0 then the embedded Mongo instance will be assigned a random port and this random port will be made known to other aspects of your Spring context (such as your MongoTemplate) which need to talk to that Mongo instance.
| {
"redpajama_set_name": "RedPajamaStackExchange"
} | 8,640 | [
128000,
48,
25,
12531,
15354,
449,
62483,
25419,
551,
35755,
9993,
11472,
2686,
25,
73479,
1702,
485,
358,
1097,
4560,
311,
6642,
264,
622,
4665,
1296,
369,
264,
12531,
15354,
449,
23711,
25419,
612,
58125,
63444,
54665,
67878,
20051,
3150,
340,
74316,
40869,
13013,
284,
12531,
46154,
6609,
13013,
43803,
345,
286,
6989,
284,
314,
7516,
287,
5095,
3150,
3602,
42661,
56098,
2323,
198,
898,
538,
5464,
84566,
2323,
19014,
262,
571,
1999,
11590,
198,
262,
586,
1118,
58125,
84566,
23711,
42,
22645,
284,
502,
58125,
84566,
7,
16,
11,
837,
629,
262,
571,
13494,
198,
262,
879,
25419,
7423,
34914,
7423,
5322,
262,
571,
2323,
198,
262,
586,
742,
4384,
2323,
19888,
262,
557,
3818,
3632,
12986,
40000,
34132,
35036,
551,
10669,
30323,
512,
220,
828,
512
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
48,
25,
12531,
15354,
449,
62483,
25419,
551,
35755,
9993,
11472,
2686,
25,
73479,
1702,
485,
358,
1097,
4560,
311,
6642,
264,
622,
4665,
1296,
369,
264,
12531,
15354,
449,
23711,
25419,
612,
58125,
63444,
54665,
67878,
20051,
3150,
340,
74316,
40869,
13013,
284,
12531,
46154,
6609,
13013,
43803,
345,
286,
6989,
284,
314,
7516,
287,
5095,
3150,
3602,
42661,
56098,
2323,
198,
898,
538,
5464,
84566,
2323,
19014,
262,
571,
1999,
11590,
198,
262,
586,
1118,
58125,
84566,
23711,
42,
22645,
284,
502,
58125,
84566,
7,
16,
11,
837,
629,
262,
571,
13494,
198,
262,
879,
25419,
7423,
34914,
7423,
5322,
262,
571,
2323,
198,
262,
586,
742,
4384,
2323,
19888,
262,
557,
3818,
3632,
12986,
40000,
34132,
35036,
551,
10669,
30323,
512,
220,
828,
512,
-100
] |
Whether you're repainting the exterior of your house, or just a room, Time Equipment Rental & Sales has everything a home owner could need for their next painting project. We rent painting and drywall equipment to home owners and contractors every day. In addition to renting our painting and drywall supplies, we also offer air compressors, sandblasters, paint sprayers, and sheetrock tools for rent. Our air compressor rentals are great for contractors who air powered tools, nailers, jackhammers, and whatever else might get the job done. Call us at 605-348-2360 for rates! | {
"redpajama_set_name": "RedPajamaC4"
} | 335 | [
128000,
25729,
499,
2351,
2109,
71959,
279,
28362,
315,
701,
3838,
11,
477,
1120,
264,
3130,
11,
4212,
20849,
40298,
612,
16207,
706,
4395,
264,
2162,
6506,
1436,
1205,
369,
872,
1828,
19354,
2447,
13,
1226,
8175,
19354,
323,
9235,
16836,
7241,
311,
2162,
7980,
323,
33840,
1475,
1938,
13,
763,
5369,
311,
53327,
1057,
19354,
323,
9235,
16836,
17135,
11,
584,
1101,
3085,
3805,
25633,
1105,
11,
9462,
2067,
14533,
11,
6308,
8314,
5184,
11,
323,
1364,
8980,
377,
7526,
369,
8175,
13,
5751,
3805,
59977,
48104,
527,
2294,
369,
33840,
889,
3805,
23134,
7526,
11,
32095,
388,
11,
26128,
5721,
23621,
11,
323,
8996,
775,
2643,
636,
279,
2683,
2884,
13,
7290,
603,
520,
220,
19666,
12,
19746,
12,
14087,
15,
369,
7969,
0,
128256,
128256
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0
] | [
25729,
499,
2351,
2109,
71959,
279,
28362,
315,
701,
3838,
11,
477,
1120,
264,
3130,
11,
4212,
20849,
40298,
612,
16207,
706,
4395,
264,
2162,
6506,
1436,
1205,
369,
872,
1828,
19354,
2447,
13,
1226,
8175,
19354,
323,
9235,
16836,
7241,
311,
2162,
7980,
323,
33840,
1475,
1938,
13,
763,
5369,
311,
53327,
1057,
19354,
323,
9235,
16836,
17135,
11,
584,
1101,
3085,
3805,
25633,
1105,
11,
9462,
2067,
14533,
11,
6308,
8314,
5184,
11,
323,
1364,
8980,
377,
7526,
369,
8175,
13,
5751,
3805,
59977,
48104,
527,
2294,
369,
33840,
889,
3805,
23134,
7526,
11,
32095,
388,
11,
26128,
5721,
23621,
11,
323,
8996,
775,
2643,
636,
279,
2683,
2884,
13,
7290,
603,
520,
220,
19666,
12,
19746,
12,
14087,
15,
369,
7969,
0,
-100,
-100,
-100
] |
Israel strikes 4 Hamas targets in Gaza
Israel struck at Hamas military bases in the Gaza Strip overnight, killing a 10-year-old boy and his 6-year-old sister, a Palestinian official said Saturday.
A 10-year-old Palestinian boy and his six-year-old sister were killed, according to Palestinian medical sources and the al Qassam Brigades, the armed wing of Hamas.
Rockets fired from the Gaza Strip by Palestinian militants hit southern Israel on Friday night without causing damage or injuries, the Israeli army said.
Lieutenant Peter Lerner, a spokesman for the Israeli Defense Forces, defended the Gaza airstrike, and told Reuters that Friday's rocket launch was an attempt by Hamas militants to "threaten the security and safety of the people of southern Israel".
The previous year, three lions were also sent from the Gaza Strip to Jordan after the area of their zoo came under heavy Israeli artillery fire.
Seven Palestinians are blocked since Thursday morning in the collapse of a tunnel in the Gaza Strip border with Egypt, latest incident of this kind in the territory, said the rescue.
In a statement, the group said Israel bore responsibility for the death of the child in Beit Lahia and for what it described as the Jewish state's ongoing "war crimes" against the Palestinians.
The Israeli embassy in Paris announced on Saturday that France will oblige a request by Israel to end the broadcast of the Al-Aqsa television station, affiliated with the Gaza-based Hamas movement, over France's EUTELSAT satellite company. "I went to the room and found three of children injured, two badly", said Abu Khousa, whose home is about a mile from Gaza's border with Israel.
A months-long wave of Israeli-Palestinian violence has seen more than 190 Palestinians killed since October 1 of past year, usually following alleged attacks on Israelis or in clashes with Israeli forces.
"Our policy in regard to the Gaza Strip is clear: Israel will not tolerate any rocket fire from Gaza toward Israel", the prime minister said Sunday.
"The military will continue to act to protect those who threaten innocent lives and Israel's sovereignty", he said.
Special correspondent Shuttleworth reported from Jerusalem.
Gaza's
<a href="https://ufabet8s.com">UFABET</a> 05/02/2020 20:45
A debt of gratitude is in order for this article extremely supportive. much obliged. UFABET
gauri 12/18/2018 07:47
rez del rosario 09/01/2018 09:28
why is it happening?
Winifred Barrera 10/15/2019 10:22
A strike of the country is made with force and approach for the surfaces for the identity of the terms for the citizens. The strength is hidden and speedypaper reviews for the movement for the flicked operations for the kids. The start is initiated for the offs for the opportunities for the difference of the arguments for the kids and tips for the humanity based items or the kids. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 9,745 | [
128000,
34627,
23170,
220,
19,
41741,
11811,
304,
29762,
198,
34627,
17948,
520,
41741,
6411,
23963,
304,
279,
29762,
35999,
25402,
11,
13419,
264,
220,
605,
4771,
6418,
8334,
323,
813,
220,
21,
4771,
6418,
13219,
11,
264,
22596,
4033,
1071,
7884,
627,
32,
220,
605,
4771,
6418,
22596,
8334,
323,
813,
4848,
4771,
6418,
13219,
1051,
7577,
11,
4184,
311,
22596,
6593,
8336,
323,
279,
453,
1229,
395,
309,
38889,
3536,
11,
279,
17903,
20611,
315,
41741,
627,
49,
20174,
14219,
505,
279,
29762,
35999,
555,
22596,
39449,
4295,
18561,
6921,
389,
6740,
3814,
2085,
14718,
5674,
477,
15319,
11,
279,
16286,
13695,
1071,
627,
77591,
38357,
11291,
445,
42472,
11,
264,
18367,
369,
279,
16286,
16777,
30500,
11,
35844,
279,
29762,
59410,
41752,
11,
323,
3309
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
34627,
23170,
220,
19,
41741,
11811,
304,
29762,
198,
34627,
17948,
520,
41741,
6411,
23963,
304,
279,
29762,
35999,
25402,
11,
13419,
264,
220,
605,
4771,
6418,
8334,
323,
813,
220,
21,
4771,
6418,
13219,
11,
264,
22596,
4033,
1071,
7884,
627,
32,
220,
605,
4771,
6418,
22596,
8334,
323,
813,
4848,
4771,
6418,
13219,
1051,
7577,
11,
4184,
311,
22596,
6593,
8336,
323,
279,
453,
1229,
395,
309,
38889,
3536,
11,
279,
17903,
20611,
315,
41741,
627,
49,
20174,
14219,
505,
279,
29762,
35999,
555,
22596,
39449,
4295,
18561,
6921,
389,
6740,
3814,
2085,
14718,
5674,
477,
15319,
11,
279,
16286,
13695,
1071,
627,
77591,
38357,
11291,
445,
42472,
11,
264,
18367,
369,
279,
16286,
16777,
30500,
11,
35844,
279,
29762,
59410,
41752,
11,
323,
3309,
-100
] |
Home » Collaborative Robots Enter the Mainstream
Robotics Assembly
Collaborative Robots Enter the Mainstream
After decades of hiding behind safety barriers and protective cages, robots are starting to work alongside humans on assembly lines. Photo courtesy Audi AG
Next-generation machines equipped with state-of-the-art sensor technology allow robots to operate side-by-side with humans. Photo courtesy Rethink Robotics Inc.
This robot was designed to meet the flexible and agile production needs of the consumer electronics industry and other assembly applications that require small parts. Photo courtesy ABB Robotics
Promises of safety, flexibility and increased productivity are luring engineers to consider the new generation of power- and force-limited machines. Photo courtesy KUKA Robotics Corp.
This collaborative robot helps manufacturers solve ergonomic challenges by handling applications that are physically demanding for humans, such as heavy lifting. Photo courtesy Fanuc America Corp
Collaborative technology promises to transform robots from dangerous machines to safe tools. Photo by Austin Weber
This SCARA robot relies on sensors that constantly limit collision forces and permit humans to safely access the robot's active workspace while the machine is operating at full speed. Photo courtesy Precise Automation Inc.
Collaborative robots are the hottest segment of the robotics industry. Photo courtesy ABB Robotics
Austin Weber
KEYWORDS collaborative robots / machine guarding / robot safety
"Just like me, they long to be close to you." That's the refrain from a popular 1970s song by the late Karen Carpenter.
Those lyrics also apply to robots today. After decades of hiding behind safety barriers and protective cages, robots are ready to work alongside humans on assembly lines.
If they live up to all the hype, collaborative robots will transform manufacturing. However, the technology is clouded by several myths and misperceptions. There are also challenges and limitations, such as parts feeding and payload capacity. But, once those issues and concerns are resolved, human-robot interaction will become more common in factories.
Collaborative robots are the hottest segment of the robotics industry. Many engineers are intrigued by the potential of next-generation machines equipped with state-of-the-art sensor technology that allows robots to operate side-by-side with humans.
Technology pioneers Rethink Robotics and Universal Robots recently rolled out new models, while industry stalwarts like ABB and Fanuc have also entered the game and introduced collaborative robots of their own.
Rethink Robotics Inc. helped coin the term "collaborative" and spawned the new class of robots several years ago when it launched Baxter. Earlier this year, it unveiled a smaller machine called Sawyer.
"We have always considered a truly 'collaborative' robot to be one with power- and force-limited motion control, with internal sensors and inherent safety mechanisms that enable its safe operation among humans on production lines," says Eric Foellmer, marketing manager at Rethink Robotics. "Hand-guided programming is another important element of the category.
"The net effect of that is a robot that can work safely next to people in production environments without safety guarding; can be trained by hand to do a task; and is inherently designed to modify its behavior to work around humans," explains Foellmer.
"Unlike traditional industrial robots, collaborative robots are lightweight, flexible and can easily be moved and reprogrammed to solve new tasks," notes Scott Mabie, general manager for Universal Robots' Americas division. "[They meet] the short-run production challenge faced by companies adjusting to ever more advanced processing in smaller batch sizes."
"With traditional robots, the capital costs for the [machines] themselves account for only 25 percent to 30 percent of the total system costs," claims Mabie. "The remaining costs are associated with robot programming, setup and dedicated, shielded workcells. The 'out of box experience' with a collaborative robot is typically less than an hour. That's the time it takes to unpack the robot, mount it and program the first simple task."
"Safety barriers are expensive, consume a great deal of bench and floor space, obstruct access to equipment and reduce productivity," adds Brian Carlisle, president and CEO of Precise Automation Inc., which recently unveiled a line of robots for benchtop assembly applications, such as adhesive dispensing and screwdriving. The company's PP100 Cartesian robot relies on sensors that constantly limit collision forces and permit humans to safely access the robot's active workspace while the machine is operating at full speed.
Carlisle, a robotics industry veteran, believes that collaborative machines are not a fad. "It is [now possible to deploy] inherently safe robots with limited force and inertia that cannot hurt people," he explains. "These robots can be less expensive than heavier payload machines. Low-cost, safe robots open up new application areas and reduce assembly costs below offshore costs.
"These robots are now cheaper than the cost of labor in China," claims Carlisle. "That's driving a lot of new interest in automation."
According to Carlisle, collaborative robots are ideal for small-part assembly applications common in the consumer electronics and medical device industry. In particular, he says there's a big need for automated driving of M1 screws.
"Collaboration" Defined
The term "collaborative robot" is defined broadly. Every supplier has a different spin on the topic.
Generically, it refers to "systems capable of independent movement that share a workspace simultaneously with humans; that work interactively with them; and that assume there will be some mutual physical contact," explains Dan Kara, robotics practice director at ABI Research Inc.
However, Kara says it's important to separate the hype from reality. "The biggest myth is that collaborative robots are inherently safe," he warns. "In the broad definition, they're not as safe as advertised and require some safety measures. Also, some degree of programming and systems integration is required."
Kara claims that the technology is characterized by four capabilities:
Sharing a workspace—robot and human share a common workspace simultaneously.
Interactive collaboration—robot and human work together interactively.
Independent movement—robot and human move independently of each other.
Physical contact assumed—there is some physical contact between a robot and a human, either directly or through an intermediary object.
According to Jeremy Marvel, Ph.D., a computer scientist at the National Institute of Standards and Technology (NIST), there are several levels of collaboration. "The current state of the art is sequentialcollaboration, which involves robots and humans working together discretely to complete various steps in a production process," explains Marvel, who is involved in a multiyear project studying the performance of collaborative robot systems, including assembly applications.
"The new types of robots emerging today are capable of simultaneous collaboration, in which two or more parties are performing separate tasks on a shared workpiece at the same time," says Marvel. "The next step will be supportive collaboration, in which two robots or a robot and a human are working simultaneously on the same task on the same product. That future-forward scenario is still at least five years down the road."
On the outside, today's state-of-the-art machines look similar to traditional Cartesian, SCARA and six-axis robots, but they're actually much different. They are typically lighter and slower, and they have smaller payload capacities. Their mass and momentum are effectively reduced.
"Collaborative robots offer many advantages over traditional industrial robots for certain applications," claims Foellmer. "They're safe to operate next to people without cages, so they can be utilized in highly manual production lines that have historically been off-limits to traditional robotic systems.
"Most robots in the category are also significantly easier to program than their industrial counterparts," says Foellmer. "With our robots, line workers and other nonengineers can easily train the robot to do a meaningful task.
"[Collaborative robots] are also extremely flexible, meaning they can be repurposed quickly and easily to work on different tasks in a facility," adds Foellmer. "And, because they require less physical infrastructure to operate, they can fit more readily into workspaces designed for humans. This helps to maximize their return on investment, since you're able to utilize them across multiple lines in a plant."
"Collaborative technology promises to transform robots from dangerous machines to safe tools," claims Enrico Iversen, CEO of Universal Robots, which recently unveiled its third robot, the UR3, a tabletop machine that's designed for assembly applications, such as adhesive bonding and screwdriving. "Traditional training is not required to program and use them."
Growing Demand
Collaborative robots are not just a passing fad. As the technology matures, they will become a key segment of the manufacturing automation market.
More than one-quarter (27 percent) of respondents in ASSEMBLY's 2015 State of the Profession study expect to deploy collaborative robotic technology during the next 12 months. Not surprisingly, more than one-third (34 percent) of assemblers that plan to invest in next-generation robots claim that it's because they are having trouble finding skilled workers. The next biggest reason is to improve productivity.
Almost one-half (44 percent) of manufacturers in the transportation equipment sector, which includes automakers and suppliers, plan to invest in collaborative robots. Other industries eager to allow humans and robots to work in close proximity on assembly lines include computer and electronic products (39 percent) and contract manufacturers (32 percent).
According to a recent study conducted by ABI Research, the collaborative robotics sector will increase tenfold between 2015 and 2020, reaching more than $1 billion.
"That growth will be fueled by three key markets: electronics manufacturers and electronics manufacturing services companies; small- to medium-sized manufacturers; and manufacturers seeking robotic solutions optimized to support agile production methodologies," says Kara.
"This new class of robots was developed in response to a number of pressing social drivers and business imperatives, and aided by ongoing technological innovation and dropping prices for powerful enabling technology," explains Kara. "The sector is very dynamic and is expanding rapidly, with new product offerings being released into the market from both established companies and smaller, emerging firms."
Promises of safety, flexibility and increased productivity are luring engineers to consider the new generation of power- and force-limited machines.
"We are on the cusp of the next level of robotic applications," proclaims Claude Dinsmoor, general manager of material handling robotsat Fanuc America Corp., which recently unveiled the CR-35iA collaborative robot, which boasts a 35-kilogram payload capacity. The machine is currently in use at General Motors for heavy-lifting applications, such as inserting spare tires into vehicles moving down the assembly line.
"In this new [era], we can unlock more productivity by opening up workspaces and eliminating some hard guarding," explains Dinsmoor. "This was not possible until the latest robot safety standards were released in the last few years."
"The ability to deploy a collaborative robot in close proximity to a person without having to install safety guarding or reconfiguring the workspace is a big advantage for companies with limited space and budgets," adds Rethink Robotics' Foellmer. "Another reason for so much interest today is the ability for these robots to be deployed in environments where conventional automation cannot be, [due to] concerns over safety, high cost, programming complexity or lack of flexibility.
"The ability to deploy a safe, affordable, easily programmed, flexible automation solution represents an unprecedented opportunity for manufacturers to automate repetitive tasks that could only be done with human labor previously," Foellmer points out.
Manufacturers of products such as cameras, laptop computers, smartphones, toys and watches have been early adopters of collaborative robots.
"Few production arenas are changing as quickly as small-parts assembly," notes Phil Crowther, global product manager for small robots at ABB Robotics. "The electronics industry, in particular, has seen demand for products skyrocket past the supply of skilled labor. As conventional assembly methods diminish in value, manufacturers are finding it strategically and economically imperative to invest in new solutions.
"Small parts assembly is a huge market for collaborative robots," claims Crowther. "This is an emerging market that's still just in its infancy stage."
Earlier this year, ABB unveiled a dual-arm collaborative robot called YUMI. It features a magnesium skeleton covered with a floating plastic casing wrapped in soft padding to absorb impacts.
"While YuMi was specifically designed to meet the flexible and agile production needs of the consumer
electronics industry, it has equal application in any small parts assembly environment," says Crowther. Features include dual arms, flexible hands, a universal parts-feeding system, camera-based part location, lead-through programming and a state-of-the-art motion control system.
"The main interest in collaborative technology today is driven by the ability for these new robots to complete tasks that were difficult or impossible for standard articulated robots to complete before," says Mike Beaupre, director of new market sales at KUKA Robotics Corp., which offers a collaborative, seven-axis robot called the LBR iiwa (intelligent industrial work assistant). "The highest demand is coming from the consumer electronics industry, especially for [assembling smartphones, tablet computers and other products that use small components].
"Collaborative robots are more accepted and used by European manufactures, mainly due to the application of standards already published and in effect, such as ISO 10218, and opinion papers such as that from VDMA in Germany," adds Beaupre. "But, ease of use and portability is [generating] much attention from small- and medium-sized companies that need more flexible automation solutions, due to lower production volumes and shorter lot runs."
"We've experienced significant demand across many different industries," claims Rethink Robotics' Foellmer. "Typical applications include pick-and-place, line loading, material handling and machine tending. If you walk around a plant and see lightweight parts being moved around repetitively and in close proximity to people, you've likely found a great job for [collaborative] robots."
Assembly Applications
Manufacturers that have already adopted collaborative robots include automakers such as BMW, GM and Volkswagen. The machines are also in use on assembly lines at STIHL Inc. (the recipient of ASSEMBLY's 2014 Assembly Plant of the Year award).
One manufacturer that has benefitted from closer human-robot interaction on its assembly lines is Audi AG. Engineers recently deployed collaborative robots as part of the PART4you initiative at Audi's main factory in Ingolstadt, Germany, which produces the A4 sedan, the A5 coupe and the Q5 sport utility vehicle.
"The new, direct cooperation between humans and robots is an enormous help," says Johann Hegel, head of assembly technology development. "Until now, [assemblers] had to bend over material boxes to take out coolant expansion tanks.
"At first glance, this seems like a simple task, but with frequent repetitions, it can lead to back problems," explains Hegel. That task is now handled by a robot that works hand-in-hand with [humans] and is fitted with a camera and an integrated suction cup. This enables it to pick up the components from the boxes and pass them to assemblers without any safety barrier, at the right time and in an ergonomically optimal position.
"In a production process with increasing diversity of model versions, PART4you provides [our] employees with important assistance," claims Hegel. "It selects the correct component and holds it ready to be taken. This means that the employees no longer have to reach over long distances or bend down repeatedly. The robot becomes an assembly assistant operating at the same speed as the assembly
worker—not the other way around."
Employees in the A4 body shop in Ingolstadt have been working with the same type of robot equipped with an adhesive nozzle instead of a suction cup. "In the body shop, the robots support the employees by applying adhesive to bonded seams," says Hegel. "Instead of applying the adhesive to the body parts themselves, [assemblers] only have to put them in place and start the automatic procedure."
Another company that's bullish on collaborative robots is Jabil Circuit Inc. The world's third largest contract manufacturer is partnering with Rethink Robotics as an early adopter and field tester of Sawyer, a single-armed collaborative robot designed to assemble and test printed-circuit boards and other electronic components.
"Flexible automation that addresses shrinking product lifecycles and helps companies align with consumer trends is a critical technology initiative for manufacturers," says John Dulchinos, vice president of digital manufacturing at Jabil.
According to Dulchinos, the former president and CEO of robotics pioneer Adept Technology Inc., the factory of the future will be predictive and collaborative. He believes collaborative robots will enable manufacturers to address speed and customization challenges in a high-mix production environment.
Before the collaborative robot market can really take off, manufacturers must continue addressing risk assessment issues and developing industrywide safety standards, such as ANSI R15.06:2012, ISO 10218:2011 and RIA TR R15.306:2014.
More guidance will be provided in TS 15066, which is expected to be published by the end of this year by the International Standards Organization. It will focus on power- and force-limiting robots, including the tools, fixtures, parts, end effectors and machinery within a robotic workcell.
"Until TS 15066 is published, manufacturers are using common sense and their own internal risk assessment standards to determine and mitigate risk levels provided by hazards in the robotic workcell," says Rethink Robotics' Foellmer.
"TS 15066 will greatly elaborate on the existing language and fill in a lot of the existing gaps," adds Pat Davison, director of standards development at the Robotic Industries Association (RIA). "It will provide more than 40 pages of guidance."
Next month, RIA will address the latest developments on the topic at the National Robot Safety Conference in Pittsburgh. And after the event, it's hosting the International Collaborative Robots Workshop on Oct. 15.
The robotics industry is also in the process of developing standards for payload capacity and end-of-arm-tooling associated with collaborative machines.
"Starting in December, ISO will be embarking on a two-year project focusing on grippers and end effectors," says Davison. "That's important, because the gripper is the primary interface mechanism for human-robot interaction. If incidental contact occurs, that's likely the place where it will occur. As a result, we're starting to see some innovative end-of-arm tooling that looks radically different from traditional end effectors."
Recent Articles by Austin Weber
Engineers Race to Develop Wireless Charging Technology
New Technology for Dispensing Two-Part Materials
Could Apple's EV Be Assembled in Wisconsin?
Zinc Holds Promise for Lightweighting
Ford Considers More EV Vertical Integration
Austin has been senior editor for ASSEMBLY Magazine since September 1999. He has more than 21 years of b-to-b publishing experience and has written about a wide variety of manufacturing and engineering topics. Austin is a graduate of the University of Michigan.
Collaborative Robots Dominate Automate Show
Do Collaborative Robots Make Sense?
Collaborative Robot Do's and Don'ts
Green Manufacturing Goes Mainstream
Automating 3D Printing with Collaborative Robots
Demco Automation
Mikron Corp. Denver
Weiss North America Inc.
Design Tool Inc. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 5,026 | [
128000,
7778,
8345,
49681,
1413,
97146,
11502,
279,
4802,
4116,
198,
44474,
1233,
12000,
198,
15623,
4422,
1413,
97146,
11502,
279,
4802,
4116,
198,
6153,
11026,
315,
26092,
4920,
7296,
30740,
323,
29219,
81947,
11,
29807,
527,
6041,
311,
990,
16662,
12966,
389,
14956,
5238,
13,
11064,
27104,
40928,
15432,
198,
5971,
43927,
12933,
19167,
449,
1614,
8838,
10826,
38921,
12271,
5557,
2187,
29807,
311,
14816,
3185,
14656,
25034,
449,
12966,
13,
11064,
27104,
432,
774,
771,
77564,
4953,
627,
2028,
12585,
574,
6319,
311,
3449,
279,
19303,
323,
62565,
5788,
3966,
315,
279,
11761,
31591,
5064,
323,
1023,
14956,
8522,
430,
1397,
2678,
5596,
13,
11064,
27104,
362,
10306,
77564,
198,
36286,
5014,
315,
7296,
11,
25152,
323,
7319,
26206,
527,
326,
1711,
25175,
311,
2980,
279
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
7778,
8345,
49681,
1413,
97146,
11502,
279,
4802,
4116,
198,
44474,
1233,
12000,
198,
15623,
4422,
1413,
97146,
11502,
279,
4802,
4116,
198,
6153,
11026,
315,
26092,
4920,
7296,
30740,
323,
29219,
81947,
11,
29807,
527,
6041,
311,
990,
16662,
12966,
389,
14956,
5238,
13,
11064,
27104,
40928,
15432,
198,
5971,
43927,
12933,
19167,
449,
1614,
8838,
10826,
38921,
12271,
5557,
2187,
29807,
311,
14816,
3185,
14656,
25034,
449,
12966,
13,
11064,
27104,
432,
774,
771,
77564,
4953,
627,
2028,
12585,
574,
6319,
311,
3449,
279,
19303,
323,
62565,
5788,
3966,
315,
279,
11761,
31591,
5064,
323,
1023,
14956,
8522,
430,
1397,
2678,
5596,
13,
11064,
27104,
362,
10306,
77564,
198,
36286,
5014,
315,
7296,
11,
25152,
323,
7319,
26206,
527,
326,
1711,
25175,
311,
2980,
279,
-100
] |
Poetry, Drama & Criticism > Poetry > Individual poets
The Rubaiyat of Omar Khayyam: Illustrated Collector's Edition (Hardback)
Edward Fitzgerald (translator), Rene Bull (illustrator)
'A Book of Verses underneath the Bough, A Jug of Wine, a Loaf of Bread - and Thou ...' When Edward Fitzgerald first published his translation of the poetry of Omar Khayyam in 1859 it had little impact on the literary world. But a chance find in a bookshop by a friend of the Pre-Raphaelites led to it being taken up by William Morris and Edward Burne-Jones, and from then on its popularity grew. Since then, it has become one of the most popular poems. In turn, it has influenced writers such as Matthew Arnold and Thomas Hardy, not to mention many musicians and film-makers in the twentieth and twenty-first centuries. Omar Khayyam (1048-1131) was a Persian poet and philosopher who lived at the court of Malik Shah. He was also an astronomer and a mathematician. A manuscript of some of his rubaiyat (four-line verses) survives in the Bodleian Library and a copy of this manuscript is thought to have inspired Fitzgerald to begin the translation. Fitzgerald's mystical and sensual version of Omar Khayyam's quatrains is freely translated and restructured to follow the course of a day. The epigrammatic stanzas, infused with a melancholy yet consoling philosophy that urges readers to seize the day and 'make the most of what we yet may spend', have proved to be enduringly intriguing and popular. Through brilliant imagery they celebrate the sensuous pleasures of life - wine, food, love - while also mourning the painful truth of its brevity. This decorative edition features gorgeous colour illustrations with an oriental theme by Rene Bull, first published in 1913, which provide a perfect counterpoint to the lines of this extraordinarily influential poem.
Publisher: Bodleian Library
Edition: Special edition
New Selected Poems 1966-1987
Pam Ayres - The Works: The Classic Collection
Pam Ayres
Robin Kirkpatrick
Howl, Kaddish and Other Poems
Leonard Cohen Poems
Inferno: The Divine Comedy I
You Made Me Late Again!
New And Selected Poems, Volume One | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} | 5,856 | [
128000,
34004,
15501,
11,
47569,
612,
34307,
42914,
871,
68787,
871,
30440,
74072,
198,
791,
13134,
2192,
99715,
315,
54658,
20774,
352,
88,
309,
25,
71161,
59648,
596,
14398,
320,
28005,
1445,
340,
85601,
62314,
320,
45457,
705,
67527,
22353,
320,
83718,
859,
340,
52374,
6017,
315,
25187,
288,
30456,
279,
426,
1409,
11,
362,
56419,
315,
32926,
11,
264,
6621,
2642,
315,
50141,
482,
323,
86471,
2564,
6,
3277,
22653,
62314,
1176,
4756,
813,
14807,
315,
279,
32349,
315,
54658,
20774,
352,
88,
309,
304,
220,
9741,
24,
433,
1047,
2697,
5536,
389,
279,
32465,
1917,
13,
2030,
264,
6140,
1505,
304,
264,
2363,
8845,
555,
264,
4333,
315,
279,
5075,
11151,
75340,
3695,
6197,
311,
433,
1694,
4529,
709,
555,
12656,
30283,
323,
22653,
18530,
68
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
34004,
15501,
11,
47569,
612,
34307,
42914,
871,
68787,
871,
30440,
74072,
198,
791,
13134,
2192,
99715,
315,
54658,
20774,
352,
88,
309,
25,
71161,
59648,
596,
14398,
320,
28005,
1445,
340,
85601,
62314,
320,
45457,
705,
67527,
22353,
320,
83718,
859,
340,
52374,
6017,
315,
25187,
288,
30456,
279,
426,
1409,
11,
362,
56419,
315,
32926,
11,
264,
6621,
2642,
315,
50141,
482,
323,
86471,
2564,
6,
3277,
22653,
62314,
1176,
4756,
813,
14807,
315,
279,
32349,
315,
54658,
20774,
352,
88,
309,
304,
220,
9741,
24,
433,
1047,
2697,
5536,
389,
279,
32465,
1917,
13,
2030,
264,
6140,
1505,
304,
264,
2363,
8845,
555,
264,
4333,
315,
279,
5075,
11151,
75340,
3695,
6197,
311,
433,
1694,
4529,
709,
555,
12656,
30283,
323,
22653,
18530,
68,
-100
] |
A much requested topic, and one that can be quite challenging....even for the fashion obsessed like me, is how to build a stylish yet appropriate work wardrobe. This is certainly a topic that will become a weekly installment. It is simply too much to cover in one post. So, let's get started!
I think the basis for a great work wardrobe starts with a few staples. The first of which is a fabulous black sheath dress. (Or, if you're anything like me, a few different classic black sheaths.) It's always great to have these basic to fall back on when you just don't feel like pulling it all together. I am not, however, suggesting that you throw on that black dress with black pumps and a cardigan. That is not eye-catching enough for you, lovely reader! Instead merely use it as a base on which to layer something with a little flair. If your dress is the appropriate length (to the knee if you are on the taller side or right above the knee if you're on the petite side), then you have creative license to add some excitement! Start out with a great motorcycle jacket, statement necklace and some not-so-basic black pumps. Contrasting the classic with something unexpected is the first key to keeping your work wardrobe exciting! | {
"redpajama_set_name": "RedPajamaC4"
} | 850 | [
128000,
32,
1790,
11472,
8712,
11,
323,
832,
430,
649,
387,
5115,
17436,
1975,
17206,
369,
279,
11401,
44898,
1093,
757,
11,
374,
1268,
311,
1977,
264,
32461,
3686,
8475,
990,
46846,
13,
1115,
374,
7995,
264,
8712,
430,
690,
3719,
264,
17496,
47644,
13,
1102,
374,
5042,
2288,
1790,
311,
3504,
304,
832,
1772,
13,
2100,
11,
1095,
596,
636,
3940,
4999,
40,
1781,
279,
8197,
369,
264,
2294,
990,
46846,
8638,
449,
264,
2478,
87929,
13,
578,
1176,
315,
902,
374,
264,
35631,
3776,
1364,
589,
8679,
13,
320,
2244,
11,
422,
499,
2351,
4205,
1093,
757,
11,
264,
2478,
2204,
11670,
3776,
1364,
27382,
6266,
1102,
596,
2744,
2294,
311,
617,
1521,
6913,
311,
4498,
1203,
389,
994,
499,
1120,
1541,
956,
2733,
1093,
23062
] | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | [
32,
1790,
11472,
8712,
11,
323,
832,
430,
649,
387,
5115,
17436,
1975,
17206,
369,
279,
11401,
44898,
1093,
757,
11,
374,
1268,
311,
1977,
264,
32461,
3686,
8475,
990,
46846,
13,
1115,
374,
7995,
264,
8712,
430,
690,
3719,
264,
17496,
47644,
13,
1102,
374,
5042,
2288,
1790,
311,
3504,
304,
832,
1772,
13,
2100,
11,
1095,
596,
636,
3940,
4999,
40,
1781,
279,
8197,
369,
264,
2294,
990,
46846,
8638,
449,
264,
2478,
87929,
13,
578,
1176,
315,
902,
374,
264,
35631,
3776,
1364,
589,
8679,
13,
320,
2244,
11,
422,
499,
2351,
4205,
1093,
757,
11,
264,
2478,
2204,
11670,
3776,
1364,
27382,
6266,
1102,
596,
2744,
2294,
311,
617,
1521,
6913,
311,
4498,
1203,
389,
994,
499,
1120,
1541,
956,
2733,
1093,
23062,
-100
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.