task
stringlengths 12
101
| input
stringlengths 0
88.4k
| output
stringlengths 1
139k
| options
sequence | pageTitle
stringlengths 0
1.11k
| outputColName
stringlengths 1
1.13k
| url
stringlengths 14
440
| wdcFile
stringlengths 66
76
|
---|---|---|---|---|---|---|---|
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-? [Action] | Pages help | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-F [Action] | Find | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-G [Action] | Find next | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Shift-Command-G [Action] | Find previous | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-E [Action] | Use selection for find | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-J [Action] | Scroll to found selection | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Option-Command-F [Action] | Show search sidebar | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-semicolon (;) [Action] | Check spelling | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-colon (:) [Action] | Show spelling window | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-> [Action] | Zoom in | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-< [Action] | Zoom out | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-W [Action] | Close window | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-M [Action] | Minimize window | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-comma (,) [Action] | Show preferences | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Option-Command-I [Action] | Show Inspector window | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-R [Action] | Show document rulers | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Shift-Command-L [Action] | Show layout | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Shift-Command-I [Action] | Show formatting characters (invisibles) | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Shift-Command-C [Action] | Show colors window | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-H [Action] | Hide Pages | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Option-Command-H [Action] | Hide other windows | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
d6df761a__Symbols__Apple_Keyboard_Codes__Action | [Shortcut] Command-Q [Action] | Quit Pages | [] | PC Keyboard Symbols: Apple Keyboard Codes | Action | http://keyboardsymbols.blogspot.com/2008/10/apple-keyboard-codes.html | 14/1438042986646.29_20150728002306-00236-ip-10-236-191-2_133419803_9.json |
edc23dae_Buying_NZ_Timber___NZTIF__Service_Conditions | [Hazard Class] H1.1 [Exposure] Protected from the weather [Hazard] Borers [End Users] Framing, interior linings & trim, now rarely used [Service Conditions] | Always dry | [] | Buying NZ Timber » NZTIF | Service Conditions | http://www.nztif.co.nz/buying-nz-timber/ | 14/1438042988860.88_20150728002308-00050-ip-10-236-191-2_621206375_0.json |
edc23dae_Buying_NZ_Timber___NZTIF__Service_Conditions | [Hazard Class] H1.2 [Exposure] Protected from the weather, above ground but possibility of exposure to moisture [Hazard] Borers and decay fungi [End Users] Structural timbers within the building envelope including wall, ceiling and floor framing and roof trusses [Service Conditions] | Dry but possible exposure to moisture conducive to decay | [] | Buying NZ Timber » NZTIF | Service Conditions | http://www.nztif.co.nz/buying-nz-timber/ | 14/1438042988860.88_20150728002308-00050-ip-10-236-191-2_621206375_0.json |
edc23dae_Buying_NZ_Timber___NZTIF__Service_Conditions | [Hazard Class] H3.1 [Exposure] Exposed to weather but out of ground contact [Hazard] Decay fungi and borers [End Users] Cladding, fascia and exterior joinery, usually used in a vertical plane. These uses require a paint coating. May also be used in structural timbers within the building envelope. [Service Conditions] | Periodic wetting, out of ground contact | [] | Buying NZ Timber » NZTIF | Service Conditions | http://www.nztif.co.nz/buying-nz-timber/ | 14/1438042988860.88_20150728002308-00050-ip-10-236-191-2_621206375_0.json |
edc23dae_Buying_NZ_Timber___NZTIF__Service_Conditions | [Hazard Class] H3.2 [Exposure] Exposed to weather but out of ground contact [Hazard] Decay fungi and borers [End Users] All H3.1 uses plus outdoor structural applications such as decking and pergolas and fence palings and pickets. H3.2 cladding of Radiata Pine may be used unpainted. [Service Conditions] | Periodic wetting, out of ground contact | [] | Buying NZ Timber » NZTIF | Service Conditions | http://www.nztif.co.nz/buying-nz-timber/ | 14/1438042988860.88_20150728002308-00050-ip-10-236-191-2_621206375_0.json |
edc23dae_Buying_NZ_Timber___NZTIF__Service_Conditions | [Hazard Class] H4 [Exposure] Exposed to weather in ground or fresh water contact [Hazard] Decay fungi and borers [End Users] Fence and agricultural posts and landscaping [Service Conditions] | Ground contact and/or severe or continuous wetting | [] | Buying NZ Timber » NZTIF | Service Conditions | http://www.nztif.co.nz/buying-nz-timber/ | 14/1438042988860.88_20150728002308-00050-ip-10-236-191-2_621206375_0.json |
edc23dae_Buying_NZ_Timber___NZTIF__Service_Conditions | [Hazard Class] H5 [Exposure] Exposed to weather in ground or fresh water contact [Hazard] Decay fungi and borers [End Users] House piles and poles, retaining walls, transmission poles [Service Conditions] | Ground contact and/or severe or continuous wetting where uses are critical and a higher level of protection than H4 is required | [] | Buying NZ Timber » NZTIF | Service Conditions | http://www.nztif.co.nz/buying-nz-timber/ | 14/1438042988860.88_20150728002308-00050-ip-10-236-191-2_621206375_0.json |
edc23dae_Buying_NZ_Timber___NZTIF__Service_Conditions | [Hazard Class] H6 [Exposure] Seawater or estuarine ground [Hazard] Marine borers and decay [End Users] Wharf & marine piles and timbers [Service Conditions] | Salt water or estuarine immersion | [] | Buying NZ Timber » NZTIF | Service Conditions | http://www.nztif.co.nz/buying-nz-timber/ | 14/1438042988860.88_20150728002308-00050-ip-10-236-191-2_621206375_0.json |
d99db1e2__Cluster_and_High_Availability__Features | [Benefits] Red Hat's High Availability Add-On enables applications to be highly available by reducing downtime and ensuring that there is no single point of failure in a cluster. It also isolates unresponsive applications and nodes so they can't corrupt critical enterprise data [Features] | Clustering | [
[
"C",
"l",
"u",
"s",
"t",
"e",
"r",
"i",
"n",
"g"
],
[
"C",
"o",
"n",
"g",
"a"
],
[
"C",
"o",
"r",
"o",
"s",
"y",
"n",
"c"
],
[
"I",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"e",
"d",
" ",
"v",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"F",
"e",
"n",
"c",
"i",
"n",
"g",
" ",
"&",
" ",
"u",
"n",
"f",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"I",
"m",
"p",
"r",
"o",
"v",
"e",
"d",
" ",
"c",
"l",
"u",
"s",
"t",
"e",
"r",
" ",
"c",
"o",
"n",
"f",
"i",
"g",
"u",
"r",
"a",
"t",
"i",
"o",
"n",
" ",
"s",
"y",
"s",
"t",
"e",
"m"
],
[
"V",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n",
" ",
"i",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"i",
"o",
"n"
],
[
"G",
"U",
"I"
],
[
"U",
"n",
"i",
"f",
"i",
"e",
"d",
" ",
"l",
"o",
"g",
"g",
"i",
"n",
"g",
" ",
"a",
"n",
"d",
" ",
"d",
"e",
"b",
"u",
"g",
"g",
"i",
"n",
"g"
]
] | Red Hat Enterprise Cluster and High Availability | Features | https://integrauae.com/redhat-enterprise-clustering-high-availability.php | 14/1438042986646.29_20150728002306-00242-ip-10-236-191-2_859638314_4.json |
d99db1e2__Cluster_and_High_Availability__Features | [Benefits] The Conga application of Red Hat Enterprise Linux provides centralized configuration and management for the High Availability Add-On [Features] | Conga | [
[
"C",
"l",
"u",
"s",
"t",
"e",
"r",
"i",
"n",
"g"
],
[
"C",
"o",
"n",
"g",
"a"
],
[
"C",
"o",
"r",
"o",
"s",
"y",
"n",
"c"
],
[
"I",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"e",
"d",
" ",
"v",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"F",
"e",
"n",
"c",
"i",
"n",
"g",
" ",
"&",
" ",
"u",
"n",
"f",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"I",
"m",
"p",
"r",
"o",
"v",
"e",
"d",
" ",
"c",
"l",
"u",
"s",
"t",
"e",
"r",
" ",
"c",
"o",
"n",
"f",
"i",
"g",
"u",
"r",
"a",
"t",
"i",
"o",
"n",
" ",
"s",
"y",
"s",
"t",
"e",
"m"
],
[
"V",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n",
" ",
"i",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"i",
"o",
"n"
],
[
"G",
"U",
"I"
],
[
"U",
"n",
"i",
"f",
"i",
"e",
"d",
" ",
"l",
"o",
"g",
"g",
"i",
"n",
"g",
" ",
"a",
"n",
"d",
" ",
"d",
"e",
"b",
"u",
"g",
"g",
"i",
"n",
"g"
]
] | Red Hat Enterprise Cluster and High Availability | Features | https://integrauae.com/redhat-enterprise-clustering-high-availability.php | 14/1438042986646.29_20150728002306-00242-ip-10-236-191-2_859638314_4.json |
d99db1e2__Cluster_and_High_Availability__Features | [Benefits] Corosync is a cluster executive within the High Availability Add-On that implements the Totem Single Ring Ordering and Membership Protocol, delivering an extremely mature, secure, high-performing, and lightweight high-availability solution [Features] | Corosync | [
[
"C",
"l",
"u",
"s",
"t",
"e",
"r",
"i",
"n",
"g"
],
[
"C",
"o",
"n",
"g",
"a"
],
[
"C",
"o",
"r",
"o",
"s",
"y",
"n",
"c"
],
[
"I",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"e",
"d",
" ",
"v",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"F",
"e",
"n",
"c",
"i",
"n",
"g",
" ",
"&",
" ",
"u",
"n",
"f",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"I",
"m",
"p",
"r",
"o",
"v",
"e",
"d",
" ",
"c",
"l",
"u",
"s",
"t",
"e",
"r",
" ",
"c",
"o",
"n",
"f",
"i",
"g",
"u",
"r",
"a",
"t",
"i",
"o",
"n",
" ",
"s",
"y",
"s",
"t",
"e",
"m"
],
[
"V",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n",
" ",
"i",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"i",
"o",
"n"
],
[
"G",
"U",
"I"
],
[
"U",
"n",
"i",
"f",
"i",
"e",
"d",
" ",
"l",
"o",
"g",
"g",
"i",
"n",
"g",
" ",
"a",
"n",
"d",
" ",
"d",
"e",
"b",
"u",
"g",
"g",
"i",
"n",
"g"
]
] | Red Hat Enterprise Cluster and High Availability | Features | https://integrauae.com/redhat-enterprise-clustering-high-availability.php | 14/1438042986646.29_20150728002306-00242-ip-10-236-191-2_859638314_4.json |
d99db1e2__Cluster_and_High_Availability__Features | [Benefits] Virtualization is pervasive throughout today's enterprise datacenters. Not only is Red Hat Enterprise Linux designed to be a superior guest on any of the major hypervisors, but it can also be a virtualization host. Virtualization is integrated directly into the Red Hat Enterprise Linux kernel using kernel-based virtual machine (KVM) technology. As part of the kernel, your administrators get the complete breadth of Red Hat Enterprise Linux system management and security tools and certifications [Features] | Integrated virtualization | [
[
"C",
"l",
"u",
"s",
"t",
"e",
"r",
"i",
"n",
"g"
],
[
"C",
"o",
"n",
"g",
"a"
],
[
"C",
"o",
"r",
"o",
"s",
"y",
"n",
"c"
],
[
"I",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"e",
"d",
" ",
"v",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"F",
"e",
"n",
"c",
"i",
"n",
"g",
" ",
"&",
" ",
"u",
"n",
"f",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"I",
"m",
"p",
"r",
"o",
"v",
"e",
"d",
" ",
"c",
"l",
"u",
"s",
"t",
"e",
"r",
" ",
"c",
"o",
"n",
"f",
"i",
"g",
"u",
"r",
"a",
"t",
"i",
"o",
"n",
" ",
"s",
"y",
"s",
"t",
"e",
"m"
],
[
"V",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n",
" ",
"i",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"i",
"o",
"n"
],
[
"G",
"U",
"I"
],
[
"U",
"n",
"i",
"f",
"i",
"e",
"d",
" ",
"l",
"o",
"g",
"g",
"i",
"n",
"g",
" ",
"a",
"n",
"d",
" ",
"d",
"e",
"b",
"u",
"g",
"g",
"i",
"n",
"g"
]
] | Red Hat Enterprise Cluster and High Availability | Features | https://integrauae.com/redhat-enterprise-clustering-high-availability.php | 14/1438042986646.29_20150728002306-00242-ip-10-236-191-2_859638314_4.json |
d99db1e2__Cluster_and_High_Availability__Features | [Benefits] Fencing is removing access to resources from a cluster node that has lost contact with the cluster, thereby protecting resources such as shared storage from uncoordinated modification. Red Hat has made extensive improvements in the SCSI-3 PR reservations-based fencing. By enabling manual specification of keys and devices for registration and reservation, cluster administrators can bypass clvm and improve configuration and system flexibility. After fencing, the unconnected cluster node would ordinarily need to be rebooted to safely rejoin the cluster. However, unfencing allows a node to re-enable access when starting up without administrative intervention. [Features] | Fencing & unfencing | [
[
"C",
"l",
"u",
"s",
"t",
"e",
"r",
"i",
"n",
"g"
],
[
"C",
"o",
"n",
"g",
"a"
],
[
"C",
"o",
"r",
"o",
"s",
"y",
"n",
"c"
],
[
"I",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"e",
"d",
" ",
"v",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"F",
"e",
"n",
"c",
"i",
"n",
"g",
" ",
"&",
" ",
"u",
"n",
"f",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"I",
"m",
"p",
"r",
"o",
"v",
"e",
"d",
" ",
"c",
"l",
"u",
"s",
"t",
"e",
"r",
" ",
"c",
"o",
"n",
"f",
"i",
"g",
"u",
"r",
"a",
"t",
"i",
"o",
"n",
" ",
"s",
"y",
"s",
"t",
"e",
"m"
],
[
"V",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n",
" ",
"i",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"i",
"o",
"n"
],
[
"G",
"U",
"I"
],
[
"U",
"n",
"i",
"f",
"i",
"e",
"d",
" ",
"l",
"o",
"g",
"g",
"i",
"n",
"g",
" ",
"a",
"n",
"d",
" ",
"d",
"e",
"b",
"u",
"g",
"g",
"i",
"n",
"g"
]
] | Red Hat Enterprise Cluster and High Availability | Features | https://integrauae.com/redhat-enterprise-clustering-high-availability.php | 14/1438042986646.29_20150728002306-00242-ip-10-236-191-2_859638314_4.json |
d99db1e2__Cluster_and_High_Availability__Features | [Benefits] The cluster configuration system now supports load options other than XML, including the Lightweight Directory Access Protocol (LDAP). Configuration reload is validated and easily synchronized across the cluster for better usability and manageability. [Features] | Improved cluster configuration system | [
[
"C",
"l",
"u",
"s",
"t",
"e",
"r",
"i",
"n",
"g"
],
[
"C",
"o",
"n",
"g",
"a"
],
[
"C",
"o",
"r",
"o",
"s",
"y",
"n",
"c"
],
[
"I",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"e",
"d",
" ",
"v",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"F",
"e",
"n",
"c",
"i",
"n",
"g",
" ",
"&",
" ",
"u",
"n",
"f",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"I",
"m",
"p",
"r",
"o",
"v",
"e",
"d",
" ",
"c",
"l",
"u",
"s",
"t",
"e",
"r",
" ",
"c",
"o",
"n",
"f",
"i",
"g",
"u",
"r",
"a",
"t",
"i",
"o",
"n",
" ",
"s",
"y",
"s",
"t",
"e",
"m"
],
[
"V",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n",
" ",
"i",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"i",
"o",
"n"
],
[
"G",
"U",
"I"
],
[
"U",
"n",
"i",
"f",
"i",
"e",
"d",
" ",
"l",
"o",
"g",
"g",
"i",
"n",
"g",
" ",
"a",
"n",
"d",
" ",
"d",
"e",
"b",
"u",
"g",
"g",
"i",
"n",
"g"
]
] | Red Hat Enterprise Cluster and High Availability | Features | https://integrauae.com/redhat-enterprise-clustering-high-availability.php | 14/1438042986646.29_20150728002306-00242-ip-10-236-191-2_859638314_4.json |
d99db1e2__Cluster_and_High_Availability__Features | [Benefits] You can now run virtualized KVM guests as managed services [Features] | Virtualization integration | [
[
"C",
"l",
"u",
"s",
"t",
"e",
"r",
"i",
"n",
"g"
],
[
"C",
"o",
"n",
"g",
"a"
],
[
"C",
"o",
"r",
"o",
"s",
"y",
"n",
"c"
],
[
"I",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"e",
"d",
" ",
"v",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"F",
"e",
"n",
"c",
"i",
"n",
"g",
" ",
"&",
" ",
"u",
"n",
"f",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"I",
"m",
"p",
"r",
"o",
"v",
"e",
"d",
" ",
"c",
"l",
"u",
"s",
"t",
"e",
"r",
" ",
"c",
"o",
"n",
"f",
"i",
"g",
"u",
"r",
"a",
"t",
"i",
"o",
"n",
" ",
"s",
"y",
"s",
"t",
"e",
"m"
],
[
"V",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n",
" ",
"i",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"i",
"o",
"n"
],
[
"G",
"U",
"I"
],
[
"U",
"n",
"i",
"f",
"i",
"e",
"d",
" ",
"l",
"o",
"g",
"g",
"i",
"n",
"g",
" ",
"a",
"n",
"d",
" ",
"d",
"e",
"b",
"u",
"g",
"g",
"i",
"n",
"g"
]
] | Red Hat Enterprise Cluster and High Availability | Features | https://integrauae.com/redhat-enterprise-clustering-high-availability.php | 14/1438042986646.29_20150728002306-00242-ip-10-236-191-2_859638314_4.json |
d99db1e2__Cluster_and_High_Availability__Features | [Benefits] In Red Hat Enterprise Linux 6, the Web interface to luci has been redesigned and runs on TurboGears2 [Features] | GUI | [
[
"C",
"l",
"u",
"s",
"t",
"e",
"r",
"i",
"n",
"g"
],
[
"C",
"o",
"n",
"g",
"a"
],
[
"C",
"o",
"r",
"o",
"s",
"y",
"n",
"c"
],
[
"I",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"e",
"d",
" ",
"v",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"F",
"e",
"n",
"c",
"i",
"n",
"g",
" ",
"&",
" ",
"u",
"n",
"f",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"I",
"m",
"p",
"r",
"o",
"v",
"e",
"d",
" ",
"c",
"l",
"u",
"s",
"t",
"e",
"r",
" ",
"c",
"o",
"n",
"f",
"i",
"g",
"u",
"r",
"a",
"t",
"i",
"o",
"n",
" ",
"s",
"y",
"s",
"t",
"e",
"m"
],
[
"V",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n",
" ",
"i",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"i",
"o",
"n"
],
[
"G",
"U",
"I"
],
[
"U",
"n",
"i",
"f",
"i",
"e",
"d",
" ",
"l",
"o",
"g",
"g",
"i",
"n",
"g",
" ",
"a",
"n",
"d",
" ",
"d",
"e",
"b",
"u",
"g",
"g",
"i",
"n",
"g"
]
] | Red Hat Enterprise Cluster and High Availability | Features | https://integrauae.com/redhat-enterprise-clustering-high-availability.php | 14/1438042986646.29_20150728002306-00242-ip-10-236-191-2_859638314_4.json |
d99db1e2__Cluster_and_High_Availability__Features | [Benefits] System administrators can now enable, capture, and read cluster system logs via a single cluster configuration command [Features] | Unified logging and debugging | [
[
"C",
"l",
"u",
"s",
"t",
"e",
"r",
"i",
"n",
"g"
],
[
"C",
"o",
"n",
"g",
"a"
],
[
"C",
"o",
"r",
"o",
"s",
"y",
"n",
"c"
],
[
"I",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"e",
"d",
" ",
"v",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n"
],
[
"F",
"e",
"n",
"c",
"i",
"n",
"g",
" ",
"&",
" ",
"u",
"n",
"f",
"e",
"n",
"c",
"i",
"n",
"g"
],
[
"I",
"m",
"p",
"r",
"o",
"v",
"e",
"d",
" ",
"c",
"l",
"u",
"s",
"t",
"e",
"r",
" ",
"c",
"o",
"n",
"f",
"i",
"g",
"u",
"r",
"a",
"t",
"i",
"o",
"n",
" ",
"s",
"y",
"s",
"t",
"e",
"m"
],
[
"V",
"i",
"r",
"t",
"u",
"a",
"l",
"i",
"z",
"a",
"t",
"i",
"o",
"n",
" ",
"i",
"n",
"t",
"e",
"g",
"r",
"a",
"t",
"i",
"o",
"n"
],
[
"G",
"U",
"I"
],
[
"U",
"n",
"i",
"f",
"i",
"e",
"d",
" ",
"l",
"o",
"g",
"g",
"i",
"n",
"g",
" ",
"a",
"n",
"d",
" ",
"d",
"e",
"b",
"u",
"g",
"g",
"i",
"n",
"g"
]
] | Red Hat Enterprise Cluster and High Availability | Features | https://integrauae.com/redhat-enterprise-clustering-high-availability.php | 14/1438042986646.29_20150728002306-00242-ip-10-236-191-2_859638314_4.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Assistant Professor in American Studies TENURE TRACK POSITION [Start Date] 2016-2017 [Tenure Track] | Yes | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Assistant Professor in Economics TENURE TRACK POSITION [Start Date] Fall 2016 [Tenure Track] | Yes | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Assistant Professor in Italian/Italian Studies TENURE TRACK POSITION [Start Date] Fall 2016 [Tenure Track] | Yes | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Assistant Professor in Media Studies TENURE TRACK POSITION [Start Date] Fall 2016 [Tenure Track] | Yes | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Part Time Visiting Lecturer in Feminist, Gender and Sexuality Studies [Start Date] Fall 2015 [Tenure Track] | No | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Part Time Visiting Lecturer of Psychology [Start Date] Fall 2015 [Tenure Track] | No | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Part-time Lecturer in Dance, Intermediate Modern Technique [Start Date] Fall 2015 [Tenure Track] | No | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Part-time Lecturer in Dance/Movement Studies, “Dynamics of Human Movement” [Start Date] Fall 2015 [Tenure Track] | No | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Part-time Lecturer of Music Voice [Start Date] Fall 2015 [Tenure Track] | No | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Part-time Lecturers in Writing [Start Date] Fall 2015 [Tenure Track] | No | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Part-time Visiting Lecturer in Anthropology [Start Date] 2015-2016 [Tenure Track] | No | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
eb738b5a_ps_College___Faculty_Positions__Tenure_Track | [0] Visiting Lecturer of Politics [Start Date] Fall 2015 [Tenure Track] | No | [
[
"Y",
"e",
"s"
],
[
"N",
"o"
]
] | Working at Scripps College | Faculty Positions | Tenure Track | http://www.scrippscollege.edu/hr/faculty | 14/1438042986646.29_20150728002306-00117-ip-10-236-191-2_692838468_0.json |
daa84cea_Programme___Syllabus_and_Books__Title | [Author] K.V.Shanbhogue [Publisher] Bharat Law House [Title] | Company Law Procedure | [] | CS - Professional Programme : Syllabus and Books | Title | http://www.futureaccountant.com/almanac/cs-professional-programme-syllabus-references-readings-books/gu/ | 14/1438042988860.88_20150728002308-00092-ip-10-236-191-2_458750686_5.json |
daa84cea_Programme___Syllabus_and_Books__Title | [Author] M.L.Sharma [Publisher] Tax Publishers [Title] | Company Procedures and Registrar of Companies | [] | CS - Professional Programme : Syllabus and Books | Title | http://www.futureaccountant.com/almanac/cs-professional-programme-syllabus-references-readings-books/gu/ | 14/1438042988860.88_20150728002308-00092-ip-10-236-191-2_458750686_5.json |
daa84cea_Programme___Syllabus_and_Books__Title | [Author] A.M.Chakraborti, B.P.Bhargava [Publisher] Taxmann [Title] | Company Notices, Meetings and Resolutions | [] | CS - Professional Programme : Syllabus and Books | Title | http://www.futureaccountant.com/almanac/cs-professional-programme-syllabus-references-readings-books/gu/ | 14/1438042988860.88_20150728002308-00092-ip-10-236-191-2_458750686_5.json |
daa84cea_Programme___Syllabus_and_Books__Title | [Author] S.Kannan, V.S.Sowrirajan [Publisher] Taxmann [Title] | Company Law Procedures | [] | CS - Professional Programme : Syllabus and Books | Title | http://www.futureaccountant.com/almanac/cs-professional-programme-syllabus-references-readings-books/gu/ | 14/1438042988860.88_20150728002308-00092-ip-10-236-191-2_458750686_5.json |
daa84cea_Programme___Syllabus_and_Books__Title | [Author] R.Suryanarayanan [Publisher] Kamal Law House [Title] | Company Notices, Meetings and Resolutions | [] | CS - Professional Programme : Syllabus and Books | Title | http://www.futureaccountant.com/almanac/cs-professional-programme-syllabus-references-readings-books/gu/ | 14/1438042988860.88_20150728002308-00092-ip-10-236-191-2_458750686_5.json |
daa84cea_Programme___Syllabus_and_Books__Title | [Author] Mamta Bhargava [Publisher] Shreeji Publishers [Title] | Concise Commentary on companies Act | [] | CS - Professional Programme : Syllabus and Books | Title | http://www.futureaccountant.com/almanac/cs-professional-programme-syllabus-references-readings-books/gu/ | 14/1438042988860.88_20150728002308-00092-ip-10-236-191-2_458750686_5.json |
daa84cea_Programme___Syllabus_and_Books__Title | [Author] Dr.K.R.Chandratre [Publisher] Bharat Law House [Title] | Company Law & Secretarial Practice | [] | CS - Professional Programme : Syllabus and Books | Title | http://www.futureaccountant.com/almanac/cs-professional-programme-syllabus-references-readings-books/gu/ | 14/1438042988860.88_20150728002308-00092-ip-10-236-191-2_458750686_5.json |
42317e57_di_Dench___James_Bond_007_Wiki__Title | [Year] 2012 [Role] M [Other notes] Released (Final apperance) [Title] | Skyfall | [
[
"S",
"k",
"y",
"f",
"a",
"l",
"l"
],
[
"Q",
"u",
"a",
"n",
"t",
"u",
"m",
" ",
"o",
"f",
" ",
"S",
"o",
"l",
"a",
"c",
"e"
],
[
"C",
"a",
"s",
"i",
"n",
"o",
" ",
"R",
"o",
"y",
"a",
"l",
"e"
],
[
"D",
"i",
"e",
" ",
"A",
"n",
"o",
"t",
"h",
"e",
"r",
" ",
"D",
"a",
"y"
],
[
"T",
"h",
"e",
" ",
"W",
"o",
"r",
"l",
"d",
" ",
"i",
"s",
" ",
"N",
"o",
"t",
" ",
"E",
"n",
"o",
"u",
"g",
"h"
],
[
"T",
"o",
"m",
"o",
"r",
"r",
"o",
"w",
" ",
"N",
"e",
"v",
"e",
"r",
" ",
"D",
"i",
"e",
"s"
],
[
"G",
"o",
"l",
"d",
"e",
"n",
"E",
"y",
"e"
]
] | Judi Dench - James Bond 007 Wiki | Title | http://jamesbond.wikia.com/wiki/Judi_Dench | 14/1438042986646.29_20150728002306-00009-ip-10-236-191-2_124720589_0.json |
42317e57_di_Dench___James_Bond_007_Wiki__Title | [Year] 2008 [Role] M [Other notes] Released [Title] | Quantum of Solace | [
[
"S",
"k",
"y",
"f",
"a",
"l",
"l"
],
[
"Q",
"u",
"a",
"n",
"t",
"u",
"m",
" ",
"o",
"f",
" ",
"S",
"o",
"l",
"a",
"c",
"e"
],
[
"C",
"a",
"s",
"i",
"n",
"o",
" ",
"R",
"o",
"y",
"a",
"l",
"e"
],
[
"D",
"i",
"e",
" ",
"A",
"n",
"o",
"t",
"h",
"e",
"r",
" ",
"D",
"a",
"y"
],
[
"T",
"h",
"e",
" ",
"W",
"o",
"r",
"l",
"d",
" ",
"i",
"s",
" ",
"N",
"o",
"t",
" ",
"E",
"n",
"o",
"u",
"g",
"h"
],
[
"T",
"o",
"m",
"o",
"r",
"r",
"o",
"w",
" ",
"N",
"e",
"v",
"e",
"r",
" ",
"D",
"i",
"e",
"s"
],
[
"G",
"o",
"l",
"d",
"e",
"n",
"E",
"y",
"e"
]
] | Judi Dench - James Bond 007 Wiki | Title | http://jamesbond.wikia.com/wiki/Judi_Dench | 14/1438042986646.29_20150728002306-00009-ip-10-236-191-2_124720589_0.json |
42317e57_di_Dench___James_Bond_007_Wiki__Title | [Year] 2006 [Role] M [Other notes] Released [Title] | Casino Royale | [
[
"S",
"k",
"y",
"f",
"a",
"l",
"l"
],
[
"Q",
"u",
"a",
"n",
"t",
"u",
"m",
" ",
"o",
"f",
" ",
"S",
"o",
"l",
"a",
"c",
"e"
],
[
"C",
"a",
"s",
"i",
"n",
"o",
" ",
"R",
"o",
"y",
"a",
"l",
"e"
],
[
"D",
"i",
"e",
" ",
"A",
"n",
"o",
"t",
"h",
"e",
"r",
" ",
"D",
"a",
"y"
],
[
"T",
"h",
"e",
" ",
"W",
"o",
"r",
"l",
"d",
" ",
"i",
"s",
" ",
"N",
"o",
"t",
" ",
"E",
"n",
"o",
"u",
"g",
"h"
],
[
"T",
"o",
"m",
"o",
"r",
"r",
"o",
"w",
" ",
"N",
"e",
"v",
"e",
"r",
" ",
"D",
"i",
"e",
"s"
],
[
"G",
"o",
"l",
"d",
"e",
"n",
"E",
"y",
"e"
]
] | Judi Dench - James Bond 007 Wiki | Title | http://jamesbond.wikia.com/wiki/Judi_Dench | 14/1438042986646.29_20150728002306-00009-ip-10-236-191-2_124720589_0.json |
42317e57_di_Dench___James_Bond_007_Wiki__Title | [Year] 2002 [Role] M [Other notes] Released [Title] | Die Another Day | [
[
"S",
"k",
"y",
"f",
"a",
"l",
"l"
],
[
"Q",
"u",
"a",
"n",
"t",
"u",
"m",
" ",
"o",
"f",
" ",
"S",
"o",
"l",
"a",
"c",
"e"
],
[
"C",
"a",
"s",
"i",
"n",
"o",
" ",
"R",
"o",
"y",
"a",
"l",
"e"
],
[
"D",
"i",
"e",
" ",
"A",
"n",
"o",
"t",
"h",
"e",
"r",
" ",
"D",
"a",
"y"
],
[
"T",
"h",
"e",
" ",
"W",
"o",
"r",
"l",
"d",
" ",
"i",
"s",
" ",
"N",
"o",
"t",
" ",
"E",
"n",
"o",
"u",
"g",
"h"
],
[
"T",
"o",
"m",
"o",
"r",
"r",
"o",
"w",
" ",
"N",
"e",
"v",
"e",
"r",
" ",
"D",
"i",
"e",
"s"
],
[
"G",
"o",
"l",
"d",
"e",
"n",
"E",
"y",
"e"
]
] | Judi Dench - James Bond 007 Wiki | Title | http://jamesbond.wikia.com/wiki/Judi_Dench | 14/1438042986646.29_20150728002306-00009-ip-10-236-191-2_124720589_0.json |
42317e57_di_Dench___James_Bond_007_Wiki__Title | [Year] 1999 [Role] M [Other notes] Released [Title] | The World is Not Enough | [
[
"S",
"k",
"y",
"f",
"a",
"l",
"l"
],
[
"Q",
"u",
"a",
"n",
"t",
"u",
"m",
" ",
"o",
"f",
" ",
"S",
"o",
"l",
"a",
"c",
"e"
],
[
"C",
"a",
"s",
"i",
"n",
"o",
" ",
"R",
"o",
"y",
"a",
"l",
"e"
],
[
"D",
"i",
"e",
" ",
"A",
"n",
"o",
"t",
"h",
"e",
"r",
" ",
"D",
"a",
"y"
],
[
"T",
"h",
"e",
" ",
"W",
"o",
"r",
"l",
"d",
" ",
"i",
"s",
" ",
"N",
"o",
"t",
" ",
"E",
"n",
"o",
"u",
"g",
"h"
],
[
"T",
"o",
"m",
"o",
"r",
"r",
"o",
"w",
" ",
"N",
"e",
"v",
"e",
"r",
" ",
"D",
"i",
"e",
"s"
],
[
"G",
"o",
"l",
"d",
"e",
"n",
"E",
"y",
"e"
]
] | Judi Dench - James Bond 007 Wiki | Title | http://jamesbond.wikia.com/wiki/Judi_Dench | 14/1438042986646.29_20150728002306-00009-ip-10-236-191-2_124720589_0.json |
42317e57_di_Dench___James_Bond_007_Wiki__Title | [Year] 1997 [Role] M [Other notes] Released [Title] | Tomorrow Never Dies | [
[
"S",
"k",
"y",
"f",
"a",
"l",
"l"
],
[
"Q",
"u",
"a",
"n",
"t",
"u",
"m",
" ",
"o",
"f",
" ",
"S",
"o",
"l",
"a",
"c",
"e"
],
[
"C",
"a",
"s",
"i",
"n",
"o",
" ",
"R",
"o",
"y",
"a",
"l",
"e"
],
[
"D",
"i",
"e",
" ",
"A",
"n",
"o",
"t",
"h",
"e",
"r",
" ",
"D",
"a",
"y"
],
[
"T",
"h",
"e",
" ",
"W",
"o",
"r",
"l",
"d",
" ",
"i",
"s",
" ",
"N",
"o",
"t",
" ",
"E",
"n",
"o",
"u",
"g",
"h"
],
[
"T",
"o",
"m",
"o",
"r",
"r",
"o",
"w",
" ",
"N",
"e",
"v",
"e",
"r",
" ",
"D",
"i",
"e",
"s"
],
[
"G",
"o",
"l",
"d",
"e",
"n",
"E",
"y",
"e"
]
] | Judi Dench - James Bond 007 Wiki | Title | http://jamesbond.wikia.com/wiki/Judi_Dench | 14/1438042986646.29_20150728002306-00009-ip-10-236-191-2_124720589_0.json |
42317e57_di_Dench___James_Bond_007_Wiki__Title | [Year] 1995 [Role] M [Other notes] Released [Title] | GoldenEye | [
[
"S",
"k",
"y",
"f",
"a",
"l",
"l"
],
[
"Q",
"u",
"a",
"n",
"t",
"u",
"m",
" ",
"o",
"f",
" ",
"S",
"o",
"l",
"a",
"c",
"e"
],
[
"C",
"a",
"s",
"i",
"n",
"o",
" ",
"R",
"o",
"y",
"a",
"l",
"e"
],
[
"D",
"i",
"e",
" ",
"A",
"n",
"o",
"t",
"h",
"e",
"r",
" ",
"D",
"a",
"y"
],
[
"T",
"h",
"e",
" ",
"W",
"o",
"r",
"l",
"d",
" ",
"i",
"s",
" ",
"N",
"o",
"t",
" ",
"E",
"n",
"o",
"u",
"g",
"h"
],
[
"T",
"o",
"m",
"o",
"r",
"r",
"o",
"w",
" ",
"N",
"e",
"v",
"e",
"r",
" ",
"D",
"i",
"e",
"s"
],
[
"G",
"o",
"l",
"d",
"e",
"n",
"E",
"y",
"e"
]
] | Judi Dench - James Bond 007 Wiki | Title | http://jamesbond.wikia.com/wiki/Judi_Dench | 14/1438042986646.29_20150728002306-00009-ip-10-236-191-2_124720589_0.json |
c63b0ff4_ford_eNews__Volume_4__Issue_13__Management | [Leadership] Creates new paradigm/vision [Management] | Works within the paradigm/vision | [] | Hereford eNews: Volume 4, Issue 13 | Management | http://www.hereford.org/enews/2007/2007-03wk5.html | 14/1438042988860.88_20150728002308-00145-ip-10-236-191-2_498355596_1.json |
c63b0ff4_ford_eNews__Volume_4__Issue_13__Management | [Leadership] Works on the system [Management] | Works within the system | [] | Hereford eNews: Volume 4, Issue 13 | Management | http://www.hereford.org/enews/2007/2007-03wk5.html | 14/1438042988860.88_20150728002308-00145-ip-10-236-191-2_498355596_1.json |
c63b0ff4_ford_eNews__Volume_4__Issue_13__Management | [Leadership] Leads people [Management] | Manages things | [] | Hereford eNews: Volume 4, Issue 13 | Management | http://www.hereford.org/enews/2007/2007-03wk5.html | 14/1438042988860.88_20150728002308-00145-ip-10-236-191-2_498355596_1.json |
c63b0ff4_ford_eNews__Volume_4__Issue_13__Management | [Leadership] Focuses on effectiveness [Management] | Focuses on efficiency | [] | Hereford eNews: Volume 4, Issue 13 | Management | http://www.hereford.org/enews/2007/2007-03wk5.html | 14/1438042988860.88_20150728002308-00145-ip-10-236-191-2_498355596_1.json |
c63b0ff4_ford_eNews__Volume_4__Issue_13__Management | [Leadership] Does the right thing [Management] | Does things right | [] | Hereford eNews: Volume 4, Issue 13 | Management | http://www.hereford.org/enews/2007/2007-03wk5.html | 14/1438042988860.88_20150728002308-00145-ip-10-236-191-2_498355596_1.json |
c63b0ff4_ford_eNews__Volume_4__Issue_13__Management | [Leadership] Works strategically [Management] | Works tactically | [] | Hereford eNews: Volume 4, Issue 13 | Management | http://www.hereford.org/enews/2007/2007-03wk5.html | 14/1438042988860.88_20150728002308-00145-ip-10-236-191-2_498355596_1.json |
d7e4354a_phpinfo____Master_Value | [Directive] odbc.allow_persistent [Local Value] On [Master Value] | On | [
[
"O",
"n"
],
[
"S",
"t",
"a",
"t",
"i",
"c",
" ",
"c",
"u",
"r",
"s",
"o",
"r"
],
[
"n",
"o",
" ",
"v",
"a",
"l",
"u",
"e"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"a",
"s",
" ",
"i",
"s"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"u",
"p",
" ",
"t",
"o",
" ",
"4",
"0",
"9",
"6",
" ",
"b",
"y",
"t",
"e",
"s"
],
[
"U",
"n",
"l",
"i",
"m",
"i",
"t",
"e",
"d"
]
] | phpinfo() | Master Value | http://ilkon.com/ | 14/1438042988860.88_20150728002308-00124-ip-10-236-191-2_114020094_55.json |
d7e4354a_phpinfo____Master_Value | [Directive] odbc.check_persistent [Local Value] On [Master Value] | On | [
[
"O",
"n"
],
[
"S",
"t",
"a",
"t",
"i",
"c",
" ",
"c",
"u",
"r",
"s",
"o",
"r"
],
[
"n",
"o",
" ",
"v",
"a",
"l",
"u",
"e"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"a",
"s",
" ",
"i",
"s"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"u",
"p",
" ",
"t",
"o",
" ",
"4",
"0",
"9",
"6",
" ",
"b",
"y",
"t",
"e",
"s"
],
[
"U",
"n",
"l",
"i",
"m",
"i",
"t",
"e",
"d"
]
] | phpinfo() | Master Value | http://ilkon.com/ | 14/1438042988860.88_20150728002308-00124-ip-10-236-191-2_114020094_55.json |
d7e4354a_phpinfo____Master_Value | [Directive] odbc.default_cursortype [Local Value] Static cursor [Master Value] | Static cursor | [
[
"O",
"n"
],
[
"S",
"t",
"a",
"t",
"i",
"c",
" ",
"c",
"u",
"r",
"s",
"o",
"r"
],
[
"n",
"o",
" ",
"v",
"a",
"l",
"u",
"e"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"a",
"s",
" ",
"i",
"s"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"u",
"p",
" ",
"t",
"o",
" ",
"4",
"0",
"9",
"6",
" ",
"b",
"y",
"t",
"e",
"s"
],
[
"U",
"n",
"l",
"i",
"m",
"i",
"t",
"e",
"d"
]
] | phpinfo() | Master Value | http://ilkon.com/ | 14/1438042988860.88_20150728002308-00124-ip-10-236-191-2_114020094_55.json |
d7e4354a_phpinfo____Master_Value | [Directive] odbc.default_db [Local Value] no value [Master Value] | no value | [
[
"O",
"n"
],
[
"S",
"t",
"a",
"t",
"i",
"c",
" ",
"c",
"u",
"r",
"s",
"o",
"r"
],
[
"n",
"o",
" ",
"v",
"a",
"l",
"u",
"e"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"a",
"s",
" ",
"i",
"s"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"u",
"p",
" ",
"t",
"o",
" ",
"4",
"0",
"9",
"6",
" ",
"b",
"y",
"t",
"e",
"s"
],
[
"U",
"n",
"l",
"i",
"m",
"i",
"t",
"e",
"d"
]
] | phpinfo() | Master Value | http://ilkon.com/ | 14/1438042988860.88_20150728002308-00124-ip-10-236-191-2_114020094_55.json |
d7e4354a_phpinfo____Master_Value | [Directive] odbc.default_pw [Local Value] no value [Master Value] | no value | [
[
"O",
"n"
],
[
"S",
"t",
"a",
"t",
"i",
"c",
" ",
"c",
"u",
"r",
"s",
"o",
"r"
],
[
"n",
"o",
" ",
"v",
"a",
"l",
"u",
"e"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"a",
"s",
" ",
"i",
"s"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"u",
"p",
" ",
"t",
"o",
" ",
"4",
"0",
"9",
"6",
" ",
"b",
"y",
"t",
"e",
"s"
],
[
"U",
"n",
"l",
"i",
"m",
"i",
"t",
"e",
"d"
]
] | phpinfo() | Master Value | http://ilkon.com/ | 14/1438042988860.88_20150728002308-00124-ip-10-236-191-2_114020094_55.json |
d7e4354a_phpinfo____Master_Value | [Directive] odbc.default_user [Local Value] no value [Master Value] | no value | [
[
"O",
"n"
],
[
"S",
"t",
"a",
"t",
"i",
"c",
" ",
"c",
"u",
"r",
"s",
"o",
"r"
],
[
"n",
"o",
" ",
"v",
"a",
"l",
"u",
"e"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"a",
"s",
" ",
"i",
"s"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"u",
"p",
" ",
"t",
"o",
" ",
"4",
"0",
"9",
"6",
" ",
"b",
"y",
"t",
"e",
"s"
],
[
"U",
"n",
"l",
"i",
"m",
"i",
"t",
"e",
"d"
]
] | phpinfo() | Master Value | http://ilkon.com/ | 14/1438042988860.88_20150728002308-00124-ip-10-236-191-2_114020094_55.json |
d7e4354a_phpinfo____Master_Value | [Directive] odbc.defaultbinmode [Local Value] return as is [Master Value] | return as is | [
[
"O",
"n"
],
[
"S",
"t",
"a",
"t",
"i",
"c",
" ",
"c",
"u",
"r",
"s",
"o",
"r"
],
[
"n",
"o",
" ",
"v",
"a",
"l",
"u",
"e"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"a",
"s",
" ",
"i",
"s"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"u",
"p",
" ",
"t",
"o",
" ",
"4",
"0",
"9",
"6",
" ",
"b",
"y",
"t",
"e",
"s"
],
[
"U",
"n",
"l",
"i",
"m",
"i",
"t",
"e",
"d"
]
] | phpinfo() | Master Value | http://ilkon.com/ | 14/1438042988860.88_20150728002308-00124-ip-10-236-191-2_114020094_55.json |
d7e4354a_phpinfo____Master_Value | [Directive] odbc.defaultlrl [Local Value] return up to 4096 bytes [Master Value] | return up to 4096 bytes | [
[
"O",
"n"
],
[
"S",
"t",
"a",
"t",
"i",
"c",
" ",
"c",
"u",
"r",
"s",
"o",
"r"
],
[
"n",
"o",
" ",
"v",
"a",
"l",
"u",
"e"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"a",
"s",
" ",
"i",
"s"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"u",
"p",
" ",
"t",
"o",
" ",
"4",
"0",
"9",
"6",
" ",
"b",
"y",
"t",
"e",
"s"
],
[
"U",
"n",
"l",
"i",
"m",
"i",
"t",
"e",
"d"
]
] | phpinfo() | Master Value | http://ilkon.com/ | 14/1438042988860.88_20150728002308-00124-ip-10-236-191-2_114020094_55.json |
d7e4354a_phpinfo____Master_Value | [Directive] odbc.max_links [Local Value] Unlimited [Master Value] | Unlimited | [
[
"O",
"n"
],
[
"S",
"t",
"a",
"t",
"i",
"c",
" ",
"c",
"u",
"r",
"s",
"o",
"r"
],
[
"n",
"o",
" ",
"v",
"a",
"l",
"u",
"e"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"a",
"s",
" ",
"i",
"s"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"u",
"p",
" ",
"t",
"o",
" ",
"4",
"0",
"9",
"6",
" ",
"b",
"y",
"t",
"e",
"s"
],
[
"U",
"n",
"l",
"i",
"m",
"i",
"t",
"e",
"d"
]
] | phpinfo() | Master Value | http://ilkon.com/ | 14/1438042988860.88_20150728002308-00124-ip-10-236-191-2_114020094_55.json |
d7e4354a_phpinfo____Master_Value | [Directive] odbc.max_persistent [Local Value] Unlimited [Master Value] | Unlimited | [
[
"O",
"n"
],
[
"S",
"t",
"a",
"t",
"i",
"c",
" ",
"c",
"u",
"r",
"s",
"o",
"r"
],
[
"n",
"o",
" ",
"v",
"a",
"l",
"u",
"e"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"a",
"s",
" ",
"i",
"s"
],
[
"r",
"e",
"t",
"u",
"r",
"n",
" ",
"u",
"p",
" ",
"t",
"o",
" ",
"4",
"0",
"9",
"6",
" ",
"b",
"y",
"t",
"e",
"s"
],
[
"U",
"n",
"l",
"i",
"m",
"i",
"t",
"e",
"d"
]
] | phpinfo() | Master Value | http://ilkon.com/ | 14/1438042988860.88_20150728002308-00124-ip-10-236-191-2_114020094_55.json |
df512619_Entrepreneurship__0 | [1] Public interest [2] Conflicts that arise in the emergence of digital ecosystems [3] Examples of actions that may be considered to resolve conflicts and protect the public interest [0] | Area of legal practice | [] | Entrepreneurship | 0 | http://cyber.law.harvard.edu/bold/devel03/modules/episodeII.html | 14/1438042988860.88_20150728002308-00270-ip-10-236-191-2_56409998_3.json |
df512619_Entrepreneurship__0 | [1] Support free speech, privacy, freedom of the press, freedom of assembly, freedom from persecution [2] States may desire to censor speech and commerce, and prevent political organizing in cyberspace; states may desire to pursue surveillance in cyberspace; private parties may seek to pursue “commercial surveillance” in the form of behavior tracking and target marketing. Defamation, libel, and intellectual property claims may challenge free speech and press rights. [3] Lawyers may take action to preserve rights already available under the law, as well as work to advocate new laws that provide stronger protections. In addition, lawyers may are argue the case for rights “in the court of public opinion” in order to build public support. In cases where the local legal situation does not protect rights, lawyers may also appeal to international organizations for assistance. A clear understanding of the nature of these civil liberties by the public and the entrepreneurs who rely upon these civil liberties may emerge and become important to pre-empting disputes before they escalate in a costly manner. [0] | Civil Liberties | [] | Entrepreneurship | 0 | http://cyber.law.harvard.edu/bold/devel03/modules/episodeII.html | 14/1438042988860.88_20150728002308-00270-ip-10-236-191-2_56409998_3.json |
df512619_Entrepreneurship__0 | [1] Protect consumers, promote economic innovation, level the playing field for entrepreneurs [2] Established companies, especially telcos, may impose monopoly pricing, thus rendering many applications non-economic, and thus slowing digital development. Dominant firms may pursue predatory and anti-competitive behavior, slowing the growth of other members of the digital ecosystem and preventing the introduction of new products and services. [3] Complaints can be brought before regulators of competition policy. Civil suits can be filed on the part of companies hurt by anti-competitive behavior, seeking relief. Suits may also be filed on behalf of classes of consumers who believe themselves to be injured. Regulators may also monitor and investigate major transactions before they are finalized if they could have substantial impact on the emergence of the marketplace and on consumers. [0] | Antitrust and competition | [] | Entrepreneurship | 0 | http://cyber.law.harvard.edu/bold/devel03/modules/episodeII.html | 14/1438042988860.88_20150728002308-00270-ip-10-236-191-2_56409998_3.json |
df512619_Entrepreneurship__0 | [1] Create economic incentives for creators and innovators by establishing property rights, while also maintaining broad access to ideas and expressions of ideas as public goods [2] Overly restrictive intellectual property rules and enforcement may prevent the diffusion of innovative ideas to those who might apply them to the problems of society; lack of sufficient support for intellectual property rights may cause innovators to turn away from investing in creating innovations that could have broad applicability to social problems and have other forms of utility. [3] Civil action can be taken against pirates, and lawyers can seek to encourage the government to take criminal action, assuming the relevant statutes are in place. On the other side, lawyers can join with activists seeking broader access to intellectual property. This might include for example clarifying the status of open source software, as well as making available mechanisms for individuals to increase the availability of their intellectual property, along the lines of Creative Commons (www.creativecommons.org). In the case of AIDS drugs, activists have pushed governments to invoke clauses in WTO agreements that allow for emergency compulsory licensing of drug patents. [0] | Intellectual Property | [] | Entrepreneurship | 0 | http://cyber.law.harvard.edu/bold/devel03/modules/episodeII.html | 14/1438042988860.88_20150728002308-00270-ip-10-236-191-2_56409998_3.json |
df512619_Entrepreneurship__0 | [1] Establishment of telecommunications access as a public good [2] Monopoly or oligopoly telcos may maintain extortive prices, thus rendering many applications uneconomic, and “cream skimming” from those few businesses and individuals who can afford such prices; incumbent telcos prevent the emergence of rivals, either in the form of competitive telcos or in the form of “self-provisioning” by users through such means as VSAT (satellite) connections, cooperative Internet exchange points and peering agreements, and home-grown ISPs and WANs—including WIFI wireless WANS. [3] In developing countries that have privatized or partially privatized their telcos—which is most of them—the telecom laws on paper are quitethorough and well-conceived. This is because law reform was built into the World Bank/IFC process that most of the countries used. Unfortunately, in many cases these laws are not enforced. In such instances lawyers might consider actions to try to compel enforcement, particularly where these laws include a “private right of action” that allows parties to sue the government if harmed. In addition, there are some options for seeking relief outside counties. There are efforts for example in West Africa to create a legally binding telecom appeal process that is regional in nature and part of the ECOWAS treaty organization. In addition, in the case of foreign investment, sometimes the country of residence of the investors, such as the US, can be encouraged to complain to the developing country government. In some cases this may stimulate action, though in others it can be seen as inappropriate meddling by one nation in the affairs of another, and can harden resistance. [0] | Communi-cations | [] | Entrepreneurship | 0 | http://cyber.law.harvard.edu/bold/devel03/modules/episodeII.html | 14/1438042988860.88_20150728002308-00270-ip-10-236-191-2_56409998_3.json |
df512619_Entrepreneurship__0 | [1] Maintain open access to the commercial and labor markets and facilitate low-cost transactions among participants [2] States may use business licensing rules to exclude some entrepreneurs, and may also charge high licensing fees that have the effect of drawing excessive rents from those who can afford the fees, and blocking participation of those who cannot. Both effects reduce investment and entrepreneurial participation, and slow the development of the ecosystem. Similarly, states may use taxation as a way to extract excessive rents from those who participate in the digital ecosystem, thus slowing investment and reducing participation. Lack of effective commercial courts and alternative dispute resolution may cause private parties to become ensnarled in conflicts that otherwise could be resolved, and/or to avoid such conflicts by vertical integration—thus creating excessive bureaucracy within the ecosystem. Lack of specialized enabling laws covering e-commerce, such as laws clarifying the status of digital signatures, may slow the adoption of commercial applications. An over-restrictive labor law regime, e.g. allowing extensive non-competition agreements and restrictive labor contracts, may be regarded as barriers to job mobility. Facing the rapid transformation of digital economy, it might be crucial to reduce such barriers, since job mobility contributes, among other things, to a competitive wage market for workers with ICT skills, and ensures the diffusion of high-tech knowledge between different groups and legal entities. [3] Lawyers can take action to assure that their clients are fairly treated in instances where existing law is consistent with client interests. Unfortunately commercial law often lags in developing countries, either because it simply has not been modernized, or because the ideology of the nation is unsupportive or confiscatory toward business. In other instances, ill-fitting commercial laws on topics such as e-commerce have been adopted without proper customization to the local ecosystem and require reform. There are a variety of international organizations, many funded by the US or European governments, that help nations improve their commercial laws and procedures. In addition, the US is currently negotiating a large number of bi-lateral trade agreements—and these agreements include requirements for commercial law reform. Local lawyers can get involved in these efforts, to help the process forward, to tailor laws effectively to the local ecosystem, and to learn how particular reforms might be used to support client interests. [0] | Enterprise, Tax, e-commerce, and Labor law | [] | Entrepreneurship | 0 | http://cyber.law.harvard.edu/bold/devel03/modules/episodeII.html | 14/1438042988860.88_20150728002308-00270-ip-10-236-191-2_56409998_3.json |
df512619_Entrepreneurship__0 | [1] Maintain and “condition” the exchanges among nations, including information and communication, trade and investment, and immigration [2] States may discourage interchange with the outside world based on a variety of policy objectives. Closed, authoritarian societies attempt to restrict communication. Many societies restrict trade and investment, based on various theories of economic development, as well as on the realpolitik of protecting powerful private interests. Finally, immigration restrictions can be used to protect local workers and also to retain local workers and prevent “brain drain”—on the other hand, such restrictions limit the exchange of ideas, and may be detrimental to the development of the digital business ecosystem. [3] By its nature, international law is strongly dictated by the foreign policy and globalization theories of the nation. As such, to have an impact, a lawyer or a group of entrepreneurs must find a way to have a voice in the policy process. In recent years there have been many “ICT policy” projects in developing nations, aimed at bringing together business, government and civil society. In a few cases, such as Senegal where tariffs on telecommunications equipment were reduced, such projects have led to important policy shifts. More promising, as ICT is seen as an important contributor to trade and economic development, government leaders are becoming more informed about how to promote it, and more receptive to the involvement of entrepreneurs. Often the most receptive government officials then become those concerned with trade and development—rather than those concerned with ICT per se, such as the departments of communications. Entrepreneurs and lawyers can seek to make common purpose with those with the most progressive agendas. [0] | International | [] | Entrepreneurship | 0 | http://cyber.law.harvard.edu/bold/devel03/modules/episodeII.html | 14/1438042988860.88_20150728002308-00270-ip-10-236-191-2_56409998_3.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] AAC [Copies] 7 [Case Type Description] | Application to amend a certificate | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] AAM [Copies] 10 [Case Type Description] | Application to change accounting methods | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] ABN [Copies] 10 [Case Type Description] | Application to abandon service | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] ACB [Copies] 4 [Case Type Description] | Application to change boundary of a telephone exchange | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] ACE [Copies] 7 [Case Type Description] | Application for a certificate | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] ACN [Copies] 10 [Case Type Description] | Application to change name of utility (only when legal entity does not change) | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] ACX [Copies] 4 [Case Type Description] | Application to continue or establish an EAS agreement | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] AEC [Copies] 7 [Case Type Description] | Application to establish, revise, or cancel a contract | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] AEM [Copies] 15 [Case Type Description] | Application to increase rates on an emergency, temporary basis | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] AER [Copies] 7 [Case Type Description] | Application for exemption from requirements regarding issuance of stocks, bonds and notes | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] AGC [Copies] 7 [Case Type Description] | Application for gas curtailment | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] AIA [Copies] 4 [Case Type Description] | Application for interconnection approval | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
6b45ae7b_Purpose_Codes___PUCO__Case_Type_Description | [Purpose Code] AID [Copies] 4 [Case Type Description] | Application to issue dividends | [] | Purpose Codes - PUCO | Case Type Description | http://www.puco.ohio.gov/puco/index.cfm/docketing/purpose-codes/ | 14/1438042986646.29_20150728002306-00130-ip-10-236-191-2_650479565_0.json |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.