text
stringlengths
18
981k
meta
dict
Ford's Theatre Abraham Lincoln's Legacy Lives April 14, 1865. President Lincoln is assassinated at Ford's Theatre. Discover how a nation handled grief and loss, how everyday people experienced a national tragedy, and how we have remembered a fallen leader. Today, in partnership with Ford's Theatre Society, live dramatic productions highlight Lincoln's love of the theatre, and the power of stories to connect us to ourselves and our history. Explore Frequently Asked Questions on the assassination, John Wilkes Booth, Ford's Theatre, and the Petersen House. Tour the State Box and Stage at Ford's Join Ranger Eric for a video walkthrough of the events of the Lincoln assassination inside the state box and on the stage at Ford's Theatre. Inaugurations and Inaugurals Explore the stories of the Lincoln inaugurations. Check out our newest article on Lincoln's powerful and eloquent second Inaugural speech. Story Time Videos Check out some videos of Park Rangers reading aloud selected children's books all about the life and legacy of Abraham Lincoln. Plan your visit to Ford's Theatre National Historic Site, the Ford's Museum, and the Petersen House. Learn about Ford's Theatre Learn about the people, places, stories, and the museum collection at Ford's Theatre National Historic site. Pennsylvania Avenue NHS African American Civil War Memorial 900 Ohio Drive SW Washington , DC 20024
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Creature Comforts Brewing is an Athens, Georgia based brewery offering finely balanced artisanal beers. Since opening its doors in April 2014, Creature Comforts Brewing has made an imprint in the craft beer community with its award-winning, year-round and special release beers. www.creaturecomfortsbeer.com – facebook – twitter – instagram Creature Comforts Teams With Allagash for 2020 Get Comfortable Campaign (ATHENS, GA) – Creature Comforts Brewing Company wrapped the 2019 season of its Get Comfortable Campaign on November 13, 2019…. Two Creature Comforts Wood Cellar Beers Are Now Year Round (ATHENS, GA) – After recently expanding its wood cellar facility, Creature Comforts Brewing Company will begin offering two beers from… Creature Comforts Brewing Will Launch 2019 Get Artistic Program (ATHENS, GA) – Creature Comforts Brewing Company will launch the 2019 season of its Get Artistic community outreach program on… Creature Comforts Brews Second Batch of Mutualism with Jester King (ATHENS, GA) – Creature Comforts Brewing Company announced the second release of its collaboration with Jester King Brewery, Mutualism, from… Creature Comforts Set To Release Five Year Anniversary Ale (ATHENS, GA) – In preparation of its Five Year Anniversary celebration, Creature Comforts Brewing Company announced the release a limited… Creature Comforts Expands Wood Cellar and Specialty Brand Program (ATHENS, GA) – In an effort to grow its wood cellar and specialty brand program, Creature Comforts Brewing Company expanded… Creature Comforts Expands Distribution Footprint (Athens, GA) – Just shy of its Five Year Anniversary, Creature Comforts Brewing Company will expand its distribution footprint to… Creature Comforts & Run The Jewels Release Stay G-O-L-D (ATHENS, GA) – In preparation for the upcoming big game, Creature Comforts Brewing Company will once again team up with… Creature Comforts Partner With Russian River on 2019 Get Comfortable Campaign (ATHENS, GA) – Creature Comforts Brewing Company will launch the 2019 campaign of its flagship community outreach program, Get Comfortable,… Creature Comforts & Jackie O's Collab on Athens to Athens Grist to Grist (ATHENS, GA) – Creature Comforts Brewing Company and Jackie O's Brewery will release a collaborative saison aged in wine barrels,… Creature Comforts Tritonia with Pineapple and Lemon Coming This Month (ATHENS, GA) – Creature Comforts Brewing Company will release Tritonia with pineapple and lemon this December. The limited offering will… Creature Comforts Get Comfortable Campaign Raised $290k (ATHENS, GA) – With the vision of being a good neighbor, Creature Comforts Brewing Company has always aspired to leverage… Creature Comforts Brewing Releases Table Beer (ATHENS, GA) – Table Beer, Creature Comforts Brewing Company's Fall limited release, will return to the brewery's tasting room and…
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
When a child receives a truancy ticket it can require the child and the child's parent to appear before the principal or possibly be referred to law enforcement, causing the child and the parent to appear in court. Another result of receiving a truancy ticket can be that the school develops an intervention plan for the child to try to keep the child in school. The court may order the parent to attend parenting classes or to attend school with the child. The court can also order the child to attend school. The ticket can result in fines of up to $250 plus court fees. What Happens to Confiscated Drug Money?
{ "redpajama_set_name": "RedPajamaC4" }
The PurposeGirl Podcast Episode 027: Combatting Perfectionism to Live a Braver, More Fulfilled Life I'm the youngest of three, and when I was a little girl my parents used to tell me that they got it right the third time, that I was the perfect child. They meant well, but this set me up to strive for perfection and to fear failure because it would... I'm the youngest of three, and when I was a little girl my parents used to tell me that they got it right the third time, that I was the perfect child. They meant well, but this set me up to strive for perfection and to fear failure because it would mean others would find out that I wasn't, in fact, perfect. I've spent a lot of time working through this, and on today's episode I have the "perfect" guest to discuss issues around perfectionism and how to combat it. Petra Kolber is a leading happiness, movement, and fitness expert, and her new book is called The Perfection Detox: Tame Your Inner Critic, Live Bravely, and Unleash Your Joy, (available on Amazon). When I was younger, perfectionism was all about being the perfect daughter; for Petra it was about being perfect on the outside so she could hide the chaos of her family life that was inside of her. Petra talks about how she came to understand her own perfectionism and recognize that, instead of making her a better person, it was actually holding her back and making her world smaller. Petra discusses "enoughness" and how this leads to so many doubts, and to the fear that we're going to be discovered as a fraud. These doubts hold us back, they push us into waiting versus doing, or watching instead of taking an active role in our own life. And it's important to realize that fear and anxiety can sometimes be a sign that you're about to do something very meaningful to you. What's important is recognizing what's under the fear and then figuring out what action we need to take to address the source of the fear. Petra's book is full of practical techniques for eliminating the harmful effects of perfectionism, and one of the earlier things she teaches is how to notice the "noise," the critiques we say to ourselves frequently, and then she gives practical strategies for addressing these thoughts. The most frequent self-critiques are often tied to the same root belief; for Petra they tended to be around her sense of "enoughness," that she wasn't smart enough. More recently it tends to be around, "Am I young enough?" But being able to recognize this allows her to work with and eventually dismiss the impact of these thoughts. There are no quick fixes here – this takes work – but Petra shows us how we can actually do this successfully. By being kinder and more loving to ourselves, we're better able to be kind to other women because we're less competitive and making fewer comparisons with them. It strengthens our sense of community with other women, we can talk more openly with other women about our struggles, and we're better able to help and support other women, and in return they'll be able to support us when we need it. Perfection doesn't allow for spontaneity, for creativity, for curiosity, for failure, so how can we live bravely perfectly? We can't. Perfection doesn't allow us to live bravely. And Petra's book is a wonderful tool for combatting perfectionism and the limitations it brings, and for living a braver, more fulfilling life. To learn more about Petra Kolber and her book, please go to http://www.petrakolber.com http://www.perfectiondetox.com And near the end of the episode, Petra mentions The Four Agreements by Don Miguel Ruiz, which you can find at Amazon. It would really mean a lot to me if you would go to iTunes and leave me a review (hopefully a great one!), leave a 5 star rating, subscribe to this podcast so you never miss an episode, and download the episodes! And please spread the word and help our community grow!
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Opening Reception: THURSDAY, FEBRUARY 25, 2016, 6 – 8 P.M. During the residency, Ryan will be working on a collaborative project with students exploring the idea of enforcing a methodology to art making 'Auto-Abstraction And Happenstance In Art Making' is about finding systems and devices that exist in the everyday world that create art through happenstance. About Ryan Gander – Ryan Gander's complex and unfettered conceptual practice is stimulated by queries, investigations or what-ifs, rather than strict rules or limits. For example, what if a child's den of sheets were remade in memorialising marble (Tell My Mother not to Worry (ii), 2012)? What if all the pieces in a chess set were remade in Zebra Wood, so that neither side was entirely black nor white (Bauhaus Revisited, 2003)? Gander is a cultural magpie in the widest sense, polymathically taking popular notions apart only to rebuild them in new ways – perhaps by refilming the same ten-second clip 50 times over, as in Man on a Bridge (A study of David Lange), 2008. Language and storytelling play an overarching role in his work, not least in his series of Loose Association lectures or in his attempt to slip a nonsensical, palindromic new word, 'mitim', into the English language. Born in Chester in 1976, Ryan lives and works in London. Ryan Gander is represented by Lisson Gallery, London. The Nomadic Residents program was launched in 2006. Residents include Rirkrit Tiravanija (2006) Ann Hamilton (2007), ORLAN (2008), Hal Foster (2009), Adel Abdessemed (2010), Ghada Amer and Reza Farkhondeh (2012), Candice Breitz (2013) and Pedro Reyes (2014). The series continues with the generous support of the Jack Weinbaum Family Foundation. Saturday, January 19 at 1 p.m. Collaboration is the keystone of many of the exhibiting artists' practices in Onsite Gallery's Winter exhibition, How to Breathe Forever. Taking place at Onsite Gallery, the artists will share their perspective on what collaboration means to them and their practice. Image: DaveandJenn; No Horizons; 2017; polymer clay, acrylic paint, silicon carbide, fibre, wire, acetate and dichoric film; 8.5" x 11.25" x 19.75". Courtesy of the artist. Image courtesy of Glenbow Museum, photo by Owen Melenka. The Propeller Centre for the Visual Arts in Toronto presents a collaborative celebration of the circle using natural materials and encaustic, by OCAD alumni Daniel Beirne and Andrea Bird, who combine their mediums to push into new territory, both as individuals and together. Artists will be present on October 19. Lacis is defined by a chain mail pattern of participation that emphasizes an ethos of community, collaboration and mentorship. The exhibition was enkindled by Claire Bartleman, who tasked herself with inviting women from her immediate art community to exhibit alongside her in an effort to visualize the unofficial networks of collaboration, support and mentorship that she sees between her female peers. Each willing participant subsequently invited another, who invited another, and so forth. What results is a collection of works that are linked by relationships rather than aesthetics or content. Consequently, dialogues between the works reflect individual relationships and simultaneously create broader collective narratives. Informed by feminism and personal experience this process-based exhibition highlights the value of fellowship to professional practice. Emerging photographers 9,000 kilometres apart have collaborated on a cyber-photographic pen-pal project that explores the theme of local cultures and blurring geographic borders. North-Sur Norte-South connects OCAD University students with young photographers in Buenos Aires. The project is part of PANAMANIA, presented by CIBC, is a 35-day arts and culture festival to enrich the TORONTO 2015 Pan Am/Parapan Am Games experience. Photographers were chosen for this online photographic exchange project through an open call and by invitation. OCAD U partnered with Toronto's Gallery 44 and Ph15, a non-profit organization in Argentina that uses photography to develop expressive, communicative and technical skills in children and youth who live in vulnerable situations. North-Sur Norte-South will be exhibited at Gallery 44 from July 17 to August 1; and the Museum of Contemporary Art in Buenos Aires from August 29 to September 6, with public displays on billboards and storefronts in both cities. The images created through this collaboration are exhibited on an interactive website accessible to the Americas and the world. North-Sur Norte-South was commissioned by the Arts & Culture Program of the TORONTO 2015 Pan Am and Parapan Am Games and is also a proud IGNITE community partner. Lacis is defined by a chain mail pattern of participation that emphasizes an ethos of community, collaboration and mentorship. The exhibition was enkindled by Claire Bartleman, who tasked herself with inviting women from her immediate art community to exhibit alongside her in an effort to visualize the unofficial networks of collaboration, support and mentorship that she sees among her female peers. Each willing participant subsequently invited another, who invited another, and so forth. What results is a collection of works that are linked by relationships rather than aesthetics or content. Consequently, dialogues between the works reflect individual relationships and simultaneously create broader collective narratives. Informed by feminism and personal experience this process-based exhibition highlights the value of fellowship to professional practice.
{ "redpajama_set_name": "RedPajamaC4" }
SMES generate $1million in taxes daily at border Bulls n Bears April 29, 2019 April 29, 2019 No Comments on SMES generate $1million in taxes daily at border SMALL to medium enterprises (SMEs) are generating an average of $1 million a day at the Beitbridge Border Post through payment of taxes, according to Women Affairs, Community, Small and Medium Enterprises Development Minister, Dr Sithembiso Nyoni. Speaking at a workshop hosted by her ministry on the sidelines of the just ended Zimbabwe International Trade Fair (ZITF) in Bulawayo, Minister Nyoni said cross border traders and vendors that use the Beitbridge border post were paying taxes and thus contributing to the revival of the economy. "SMEs contribute a big percentage of Government revenue and our women constitute more than 60 percent of people in the SME sector," she said. Minister Nyoni said through the Customs office at the Beitbridge, cross border traders and vendors were injecting an average of $1 million a day into Government coffers. "This is a very significant contribution to our economy by this sector that should be applauded," said Minister Nyoni. She said what was pleasing was that more SMEs were formalising their operations and the figure had jumped from 13 000 in 2017 to more than 18 500 last year. Minister Nyoni said the figure of registered SMEs was set to increase this year as more operators realised the benefits of formalising their operations. "The World Bank in 2012 said 85 percent of SMEs in Zimbabwe were informal but now a large number has formalised and meeting tax obligations. You must feel proud because you are undertaking your national duty," she said. Minister Nyoni said it was important for all businesses to contribute to the running of the country by paying taxes. She said Government can only meet its mandate of providing services to citizens if individuals and businesses meet their obligation of paying taxes. Dr Nyoni said SMEs that have not yet formalised were at high risk of being taken advantage of by bigger companies. Meanwhile, Minister Nyoni castigated corruption by some tax officials saying those who will be found wanting in this regard will face the "long arm of the law". She said Government was in the process of simplifying its tax system to enable even very small businesses to comply. Government has been encouraging SMEs to register their operations with Zimra. —chronicle.co.zw Belarus to put up permanent national pavilion at ZITF Murowa begins diamond exploration in Chivi
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Internet domain names will soon be available in Indian regional scripts By Virendra Soni on August 13, 2018 No Comments In a push to make the internet accessible to everyone in India, the Internet Corporation for Assigned Names and Numbers (ICANN) announced that domain names will soon be available in several languages spoken in the country. What this means for internet users in the country is that they will be able to book a website name extension like .com, .in, .net, in Indian scripts like Devanagari, Bengali, Gujrati and more. According to Zinnov, the domain name registration count in India crossed 5 million milestone in 2017. "Work is on for nine Indian scripts – Bengali, Devanagari, Gujarati, Gurmukhi, Kannada, Malayalam, Oriya, Tamil and Telugu. These scripts are expected to cover many different local languages," said Samiran Gupta, Head of ICANN India. The nine Indian scripts mentioned by ICANN will make the domain names available in around 22 local languages. The aim of domain names in Indian languages is to enable the people with no English language knowledge to go online and access the websites. Mr. Gupta said that around 52% of the global population have access to internet, while many of the remaining 48% are non-English speaking people who can't type in English. The initiative to make domain names available in local Indian languages will help more people use the internet. Although people are currently able to register .bharat top-level domain (TLD) in Devanagari script, the internet servers can identify only the limited letters. ICANN has formed Neo-Brahmi script Generation Panel (NBGP) to develop Root Zone Label Generation Rules (RZ-LGR). The NBGP is a team of over 60 technical experts and linguistics from India, Nepal, Bangladesh, Sri Lanka, and Singapore. The RZ-LGR developed by this team will enable people from all over the world to register domain names in local Indian scripts. Also read: Indian Department of Telecom approves Net Neutrality rules for open internet in country Mr. Gupta further added that there are 4.2 billion internet users worldwide, which is expected to grow to 5 billion by 2022. book a website name domain name in Hindi domain name in Indian languages domain name registration domain names ICANN Root Zone Label Generation Rules RZ-LGR Top level domains Google's new HSTS list to tighten up browser security Directi, Tucows and Namecheap Partner to Manage .online Registry for ICANN's new gTLD program ICANN's application of GDPR is affecting cyber investigators from accessing WHOIS data in near real-time: Report ICANN will change DNS root key next month to strengthen security of domain name system Indian domain name market continued its growth, crossed 5 million mark in 2017: Zinnov report ".IN.NET Provides Businesses and Individuals With Good Quality Domain Names"- Neha Naik, .IN.NET .Me Announces Release Of Around.ME, Hire.ME, Fund.ME, Find.ME and For.ME For A Limited Time DreamHost Launches Online Community, "DreamScape" CloudFest – the mega cloud and hosting festival in full swing – fog, edge computing, latest processors and more
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Deadly Gas, Cheap Power Dangerous fumes from an African lake could be the fuel of tomorrow By SciIll Staff | Published Dec 13, 2008 1:35 AM To live on the banks of Africa's Lake Kivu is to risk your life every day. Large amounts of methane, carbon dioxide and hydrogen sulfide gas are dissolved in various layers of the lake's deep waters. Scientists warn that a disturbance such as a volcanic eruption or earthquake could cause a redistribution of the lake's waters and the gases in them. This shuffling, known as an overturn, could unleash an invisible, suffocating cloud of these compounds—a rare event known as a limnic eruption—killing as many as two million people nearby. Now, rather than simply wait for disaster, scientists hope to put some of that gas to use, as cheap energy. Lake Kivu, located on the border between Rwanda and the Democratic Republic of the Congo, is one of Africa's largest lakes. It covers 1,040 square miles and is nearly 1,600 feet deep. The region is particularly volcanically active, and magma and groundwater feed gases and minerals into the lake. Carbon dioxide dissolves best in high-pressure, low-temperature water like that at the bottom of the lake—and the CO₂ makes the water more dense, so it stays at the deepest levels. Dissolved methane, hydrogen sulfide and minerals also increase the water's density. Organic materials, such as dead plants and fish, decompose on the lakebed, producing additional methane. As a result, the bottom of the lake contains layers of pressurized solutions of water and gas—a lot like a bottle of soda—while the less-dense layers of water on top act like a cap. Over time, the deepest waters of the lake have accumulated about 60 cubic miles of CO₂ and about 14 cubic miles of methane. With these gases mostly trapped at the bottom, the lake's dark depths are a time bomb. A disturbance of the lake could have the same explosive effect that occurs when you open the top of a soda bottle or pop a champagne cork—a bubbling over of liquid and gas. In the lake, the cause of the sudden release might be an earthquake or the immersion of hot lava that disturbs the layers of water in the lake. Large amounts of gas would bubble up and, just like it happens in the bottles, the contents of the lake would surge up and spill over. The lake lies in the Great Rift Valley, where Africa is splitting apart as two tectonic plates move away from each other, making it an earthquake hot zone. Early this year, there were two serious quakes, which killed a total of 40 people. There have also been volcanic incidents at Lake Kivu in the past. On January 17, 2002, a stream of lava from Mt. Nyiragongo, a volcano approximately 11 miles from the lake, burned its way through the lakeside city of Goma, forcing between 300,000 and 400,000 people to flee and destroying several nearby areas. When the lava hit the water, it created a huge cloud of steam, and some scientists worried that a deadly overturn would result. Luckily, the lava sank only about 300 feet into the lake—not deep enough to release a toxic cloud of CO₂ and methane. Contract and Extract An Israeli company, Ludan Energy Overseas, is one of the contractors working to set up a facility that can exploit the lake's gas to produce electricity. Had the molten rock sank to a depth of 1,000 feet, it might have unleashed a catastrophe like the one that hit Lake Nyos in Cameroon in 1986. In the course of just a few hours, Lake Nyos released enough CO₂ to kill 1,700 people as far as 15 miles from the lake, suffocating them in a cloud of dense carbon dioxide. The event may have been triggered by a landslide, but the exact cause is unknown. And Lake Nyos wasn't the first such disaster. In 1984, an overturn at Lake Monoun, also in Cameroon, killed 37 people. Samples taken from the sediments on the bottom of Lake Kivu and from deposits on its rocks reveal that overturns like these have, in fact, occurred there within the past 5,000 years—and some scientists believe that another could strike within the next century unless something is done. Putting Gas in the Machine In Cameroon, the solution has been to install pumps that gradually pull gas from the bottom of Lake Nyos and Lake Monoun and release it at the water's surface. Researchers now realize that a similar method could bring the methane gas in Lake Kivu up into a power plant onshore. The lake contains enough gas to deliver inexpensive, clean electricity to the region for many years. A preliminary project is now in operation, and the governments of the two countries that share the lake are hoping to produce large amounts of power as soon as 2020. Rwandan officials estimate that Lake Kivu could supply electricity to almost the whole of the country for more than 40 years, with some left over for the Congo. Both countries have drafted an agreement to put Lake Kivu's methane to good use, and a number of investors, including the World Bank and contractors such as COWI, a Danish consulting group, are working to get the project under way. From a technical perspective, the process should be simple. A local brewery used methane from the lake bottom for many years to produce its energy, proving that the gas can be brought up from the lakebed and used to power businesses and homes in the area. In the 18 years before it closed, in 2004, the brewery relied almost exclusively on power produced by the lake's gas. Pumping Lake Nyos In principle, all that's required is sinking a pipe deep enough to reach the floor of the lake and pumping up the lowest layer of water. As the water rises, its pressure falls, and it releases bubbles of methane, CO₂ and other gases. The bubbles increase the buoyancy of the water and force it upward and out of the pipe, creating a partial vacuum that pulls more bottom water up; eventually, the pump is no longer necessary. The methane can then be separated from the CO₂ and hydrogen sulfide and sent to a power plant, where it will be burned to provide energy for turbines. Complicating matters, however, is the fact that the lake's CO₂ is not useful, and releasing the greenhouse gas in the process would contribute to global warming. It's the price that must be paid, say those involved, for avoiding a deadly disaster. "If we don't do anything, there will be an eruption," says Finn Hirslund, a senior engineer at COWI. "The question is how to avoid that the right way." For now, the plan is to pump the CO₂ back into the upper levels of the lake water, from which it will slowly dissipate into the air. A Bottomless Tank Scientists and engineers estimate that there are almost 10 cubic miles of methane available for extraction in Lake Kivu, and in time they expect that installations will be built to pump gases up from several locations in the deepest parts of the lake. The Rwandan and Congolese governments hope that by 2020 methane from the lake will provide 400 megawatts of electricity to be divided equally between the two countries. According to one company involved in the project, the resulting power will cost a fourth of the current price of electricity in Rwanda. In the meantime, as organic material sinks to the bottom of Lake Kivu and decomposes, more methane will continue to be produced—about 3.2 billion cubic feet a year. But rather than threatening the lives of those who make their homes on its shores, the lake could, in fact, be a source of livelihood in the region. Turn the page to read about Africa's Other Killer Lakes. Lake Nyos In 1986, gas released from Lake Nyos in Cameroon killed more than 1,700 people and thousands of animals. Africa's Other Killer Lakes Researchers know of three lakes in the world with the geological structure that make them capable of trapping and releasing deadly amounts of gas. All three lakes are in Africa, and in the past 25 years, two of them have demonstrated just how dangerous they are. The disasters at Lake Nyos and Lake Monoun in the 1980s were the first indications to scientists that the phenomenon was even possible. Pumps have been installed in both lakes to pull gas from their depths. Lake Nyos is located in northwestern Cameroon. Under its waters lies a pocket of volcanic magma, out of which CO₂ seeps and dissolves into the lake's water. On August 21, 1986, something—most likely a landslide, but possibly an earthquake or thunderstorm—triggered the release of a large amount of CO₂ from the lake. The gas spread up to 15 miles from the lake in a thick, suffocating cloud. Some people managed to escape, but 1,746 died, and thousands of animals were killed by a lack of oxygen. On the advice of scientists, a pumping system was installed in the lake in 2001. Lake Monoun is near Lake Nyos in Cameroon. On the night of August 15, 1984, people living near the lake heard a strange boom. It came from the lake, which released a CO₂ cloud that spread out and suffocated 37 people, including 10 people in a truck (according to published reports, two people sitting on the truck's roof, above the CO₂ cloud, survived). What triggered the disturbance is still unknown. Pumps were installed in 2003 to avert a repeat disaster.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
There is a new interesting project on the market – a map of developers. Started as a Laramap by Florian Wartner, now it became a broader project, presenting to you PHPMap.co! The idea is really simple – every developer can register and enter their full address which transforms them onto the map. Here's my spot based in Lithuania – in the top-right corner. In addition to that, there are two interesting things about the project. 1. It's open-sourced. You can view or contribute to the project on Github – I see already 4 contributors at the time of writing! 2. It's based on Laravel 5.3. Which is an interesting thing – recently released new framework version isn't highly adopted yet, so this is a perfect chance to view the code and see for yourself how it works. Also you can write articles there – not sure who would do that, since I wouldn't expect too much audience on the site, but you can if you want to. In Markdown – isn't that cool? Not much more to say about the project, except for thanking the author Florian again. Keep up the good work!
{ "redpajama_set_name": "RedPajamaC4" }
Jenna Wolfe Gives Birth, Welcomes Baby Girl Quinn With Today Colleague Stephanie Gosk: First Picture The three of us. Pretty amazing stuff Baby Quinny pic.twitter.com/e8W0qhTMOk — stephanie gosk (@stephgosk) February 4, 2015 Another addition! Today show weekend anchor Jenna Wolfe and her girlfriend Stephanie Gosk have welcomed their second child together. PHOTOS: Cutest baby announcements "Quinn Lily Wolfeld-Gosk born at 4:06 6lbs 12ozs Everyone is great," Gosk captioned a pic of their little one on Wednesday, Feb. 4. "Woohoo!!" PHOTOS: 2014's babies of the year Wolfe, 40, and NBC News foreign correspondent Gosk are already parents to daughter Harper, 17 months. Back in August, Wolfe announced that she was pregnant with baby No. 2. "Harper is going to be a big sister!" she revealed on-air at the time. "I figured I got pregnant, I did it right the first time. I'm just going to do the exact same thing again and we're going to hope for the best." PHOTOS: Celeb moms brag on social media Quinn Lily Wolfeld-Gosk born at 4:06 6lbs 12ozs Everyone is great. Woohoo!! pic.twitter.com/s7luCzDQKs Hours before her tot's arrival, Wolfe tweeted that she was in labor. "It's time!!!" she wrote. "This little one's as stubborn as her mama (me)," she added later in the day. "Apparently she's going to come out when she's good and ready." PHOTOS: Today's biggest moments Last month, Wolfe also shared her joys about motherhood in a Today show blog post. "One of the best things about parenting is collecting all the firsts: the first smile, the first sneeze, the first haircut, the first holiday," she wrote. "Enjoy collecting the firsts, big or small, while you can. Photograph them, talk about them, lock them away in your memory because there will undoubtedly be a time when you'll need just a little nostalgia to hold your hand and get you through your day."
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Reubenstein Creative produces video and still images for news media, corporate and social media; as well as short and long-form video interviews. With more than twenty years experience in live television news and sports production, our 'maximum efficiency' approach delivers the best quality, and turnaround times, for any project. Based in Sydney, we've produced work across Australia, New Zealand, China and Europe, contact us to find out more.
{ "redpajama_set_name": "RedPajamaC4" }
Best Price For Accutane 5mg Drugstore. SafeRXOnline. Price Of Extra Super Viagra 200mg Without Prescription Usa. Extra Super Viagra without a doctor Spinal. 5 Extra Super Viagra anything When excessive. It has, howsoever, been reported that neither TNF- nor IL-6 diverse exceeding the run of the daytime following endotoxin dispensation.The National Minority Supplier Development Council is the global leader in advancing business opportunities for its certified Asian, Black, Hispanic and Native. Best Price On Propecia 5mg Cvs. SafeRXOnline. Free Shipping, quality, privacy, secure. Cheapest Price On Cialis Extra Dosage No Prescription. This walk choose accommodate to space unwanted dun stagnant cells and unat- tached cells from the charger. Generic Prednisolone 5mg Canada. SafeRXOnline.
{ "redpajama_set_name": "RedPajamaC4" }
NEW ORLEANS – Just because another exciting weekend of action has come and gone doesn't mean that heavy changes were set to happen in the latest edition of the NCAA Division I Men's Outdoor Track & Field National Rating Index released on Monday by the U.S. Track & Field and Cross Country Coaches Association (USTFCCCA). The index stood firm as the top three teams in the nation and six out of the top-10 programs experienced no change from the previous ratings. In fact just 16 of the nation's current top-25 had any type of movement, positive or negative, in this week's release. This won't be the case for future editions as this week in the final one in which the previous season marks will be used in the National TFRI (except for the 5000, 10000 and combined events) which means that big changes are on the way a week from now. For the fourth consecutive week Texas Tech is the No. 1 team in the land, a spot they have held so far this outdoor season. The Red Raiders didn't add any new individual marks to their already impressive index rating after having an off-weekend from competition. The group will be back with the Michael Johnson Invitational at Baylor this weekend. It is the longest time spent in the top spot consecutively in program history. Holding in the No. 2 spot was Texas A&M, a spot the program has sat in for four straight weeks. The Aggies hosted their A&M Invitational this past weekend, a meet in which they captured the victory with 189 points. Texas A&M and Houston were separated by just four points with four events remaining before the Aggies were able to pull away. Remaining steady at No. 3 was Florida, the third straight week they have held the position. The Gators haven't competed since the Raleigh and Florida Relays back on March 28-30. They will go again this weekend with a short trip to Baton Rouge for the LSU Alumni Gold meet. Moving up two spots to No. 4 was LSU after a successful weekend at the Miami Hurricane Alumni Invitational. Three new marks made the index with none bigger than the new No. 1 4×400 team in the nation after the Tigers posted a 3:02.88. JuVaughn Harrison also added the third-best long jump in the ratings to go with Jaron Flournoy who is now 22nd overall in the 100 as an individual. It is the best mark for the program since the final rankings of the 2016 season. Completing the rest of the top-five at No. 5 was BYU. The Cougars are fresh off competition at the Triton Invitational. They did not add any new marks to their index rating this week. The top-10 was rounded out by Alabama, Oregon, Florida State, Houston and Mississippi State, in the following order. Just because the top-25 didn't have a lot of change overall doesn't mean that a program didn't make its mark this week as Ohio State jumped 19 spots to No. 22 after an impressive showing at the Gamecock Invitational. The largest improvement overall was taken by No. 108 Grand Canyon after a 37-spot increase. Other big gains were seen from No. 51 Northwestern State (up 21 spots) and No. 41 South Carolina State. Three previously unranked programs joined the ratings this week in No. 96 Rhode Island, No. 144 Villanova and No. 172 Alabama State. The next NCAA DI Men's National Track & Field Rating Index will be released on Monday, April 22.
{ "redpajama_set_name": "RedPajamaC4" }
Nuttin Ordinary is founded on the idea of creating clean, simple ingredient-based foods. The best way to achieve this? Using plants! We are the first 100% plant-based cheese manufacturer in New England and are proud of it. We use a proprietary probiotic blend and production process achieving the taste and consistency our customers know and love. As a zero WHEYste manufacturer, we take pride in creating foods that are both earth-friendly and sustainable. Our team at Nuttin Ordinary is grateful to have the opportunity to make clean and simple ingredient-based foods for you!
{ "redpajama_set_name": "RedPajamaC4" }
Published 04/23/2019 10:16:28 am at 04/23/2019 10:16:28 am in Refinishing Wood Kitchen Cabinets. refinishing wood kitchen cabinets icon kitchen cabinets refinishing wooden how to paint wooden kitchen cupboards. steps to painting wood kitchen cabinets,diy painting wood kitchen cabinets,painting wood kitchen cabinets color ideas,painting wood kitchen cabinets ideas,painting wood kitchen cabinets black,refinishing hardwood kitchen cabinets,cleaning hardwood kitchen cabinets,youtube painting wood kitchen cabinets,refinishing pressed wood kitchen cabinets,painting wood kitchen cabinets pictures,refinishing 1970's pressed wood kitchen cabinets.
{ "redpajama_set_name": "RedPajamaC4" }
Benson, MN – Eight new members were inducted into the Minnesota Wrestling Coaches Association (MWCA) Dave Bartelma Hall of Fame on April 27th in Benson, Minnesota. The new inductees honored were: Steve Johnson, Roger Knutson, Kory Mosher, Rodd Olson, Jerry Reker, Dan Snobl, Dan Stifter, and Dave Zuniga. Many Hall of Fame members were in attendance. MWCA Mr. Minnesota of Wrestling selection Jake Short of Simley received a plaque for personal use and a traveling plaque for his school. MWCA Coach of the Year honorees were: Class A – Joel Viss of Chatfield, Class AA – Jamie Heidt and Paul Mann of Kasson-Mantorville, and Class AAA – Dan Lefebvre of St. Michael-Albertville. The MWCA selected Dan Lefebvre as State Head Coach of the Year. Selected as State Assistant Coach of the Year was Craig Johnson of Kerkhoven-Murdock-Sunburg. Dan Lefebvre and Craig Johnson, along with MWCA Mr. Minnesota of Wrestling selection Jake Short of Simley represent Minnesota as The National Wrestling Coaches Association's State (NWCA) award winners, which qualifies them for further NWCA honors at the Regional and National levels. The MWCA presented State Champion and State Runners-up trophies based on the individual tournament to: Class A – 1st Jackson County Central, 2nd Atwater-Cosmos-Grove City; Class AA – 1st Simley, 2nd Kasson-Mantorville, Class AAA – 1st Apple Valley, 2nd St. Michael-Albertville.
{ "redpajama_set_name": "RedPajamaC4" }
When it comes to where you rank on search engines, everyone knows that organic Search Engine Optimization is one of the best was to increase targeted visitors for very little cost. In fact, SEO is absolutely critical to your search engine marketing success. As a result, every company wants to have the top search engine ranking for their keywords and phrases. Tucker Consultancy uses proven Search Engine Optimization tools and strategies to improve Your Company's rank within Search Engines. These techniques should allow you to improve your site quickly and effectively. Tucker Consultancy believes that organic Search Engine Optimization generates traffic, however it is not the fastest way to achieve results. Utilizing search engine marketing programs such as pay per click (PPC), your sites traffic can be significantly increased in a matter of days instead of months. Not every business should have a PPC program for their targeted keywords, but most will find that PPC programs will give them an edge over their competition. Tucker Consultancy has proven Pay Per Click systems that should allow you to increase traffic to your site quickly and effectively. Knowing where you are is the first step in getting to where you want to be. Web Analytics is critical to improving the measurable results of any website promotion program. You need to understand where traffic comes from, where they go, and more importantly the return on their investment (ROI) or you are simply wasting your money. Once you have a Analytics, you still need Tucker Consultancy to actually provide competent guidance in how to use the data to achieve your internet marketing goals. This technology can be very economically and present statistics to manage your business, especially when coupled with our offered consulting. Web design and SEO Design are different. Many web design companies offer "pretty" websites. But most designers only focus on how good looking the site it, not how well it performs. If you want to succeed and if you want to have the highest ROI, then you need a website that out performs your competition. Websites require planning, development, and a skilled team of web designers that focus on the overall performance of your site. Only then can they compete in a real race. A race car will almost always beat a production car. The only way to win in the search engines is to design your site for the purpose of competing. A properly designed website will succeed with both your customers and the search engines. Our Web Design section discusses design concepts and implementation techniques as well as our design-related search engine optimization services. Once you have read the massive amount of internet marketing information on this site, you may determine that you want or need some assistance. Our search engine optimization company offers SEO training, consulting, site assessments, SEO tools, co-operative projects with your staff, and even full turn-key programs to maximize your programs. We are often involved in design reviews, early launch assessments, and then the building and management of aggressive traffic-generation programs. Our Internet marketing services section is where you can learn more about how we can help improve your website or request a free price quote for search engine marketing services.
{ "redpajama_set_name": "RedPajamaC4" }
Matador has just shared "Summertime is Coming", a track from Paul Banks' new Julian Plenti Lives... EP, which is out today. That's the song above. The label also announced that Banks' previously announced album will be out in October.
{ "redpajama_set_name": "RedPajamaC4" }
Then add 1 timer, 3 textboxes, and 2 buttons. The SendKeys Function basically types out the text you specify. This enabled the timer, which in return, starts spamming your text. This disables your times, which stops the spamming. Hope you learned a thing or two from this. Edited by Kierien, 31 January 2009 - 09:02 PM. Not bad, perhaps a bit more explanation though? Newbs are not going to know what a timer does or what the SendKeys class is. Perhaps you should give more detail on these two things. Also, don't you need a timer_tick function before your timer1 will do anything? Alright, will reedit to more detail, and no we dont need a timer_tick, because we already have our timer enabled and disabled via buttons. You have misunderstood. Timer_Tick is the subroutine that runs whenever the timer ticks. ..is put within the timer_tick subroutine. ok, I'm very new, so should I attempt this or not, cause it looks like its incomplete or lacking info...?! dosn't contain definition for text and no extension method text. I think the IDE will correct that for you. Like Jordan said, newbs won't understand what this is doing. Now rename one of your buttons to "Start" Why? I don't see anywhere in your code, you referencing the button that you want me to call "Start". So why should I? Yes, you do need a timer_tick method. When you double click on a timer, one is created for you. First of all, i wanted to rename the button to "Start" so that things will look neater. Secondly, yes i know when i double click on a timer a timer_tick is created for me. But i was referring to Jordan's post on whether a timer_tick was needed before the timer would function. And yeah we would need one, but it's already created anyway.
{ "redpajama_set_name": "RedPajamaC4" }
Happy Best Friend's Day Graphics & Images June 8 is Best Friend's Day. So make sure to tell your best friend or friends how important they are by sending them one of these cute comments. These comments are perfect for posting on Facebook, Twitter, or any other friend site or blog. True friends are more priceless than gold. They're there to share all of the good times and to help you through when you're feeling low. A best friend is a treasure. Friends Forever, BFF, Happy Best Friend's Day! Take this opportunity to celebrate friendships new and old by wishing your friends a happy day, with these cute kitten photos, puppy photos, and glitter graphics.
{ "redpajama_set_name": "RedPajamaC4" }
Lovely Stocks Of Fox Factory Decals – Through the thousand Figure online about fox factory decals, we all offer the most valuable list along with greatest quality simply for you all, and of course,this photographs is actually one of photographs choices in our best images gallery in relation to Lovely Stocks Of Fox Factory Decals. I'm hoping you may think it's wonderful. published by means of Linda Snyder at 2019-02-06 18:15:18. To discover just about all photograph in Lovely Stocks Of Fox Factory Decals figure gallery remember to heed this particular our web URL.
{ "redpajama_set_name": "RedPajamaC4" }
Maruti pins hopes on festive season for demand revival The Country's Largest Car Maker Maruti Suzuki India Is Pinning Hopes On The Festive Season For A Turnaround In The Auto Industry Irrespective Of Government Help Forthcoming Or Not, According To A Senior Company Official. News Nation Bureau | Edited By : Assem Sharma | Updated on: 24 Aug 2019, 08:16:30 PM With some of the factors responsible for the slowdown in auto sales such as concern over monsoon and elections behind, the company is hopeful that revival in demand especially from rural markets and peak discounts along with new model launches will play a crucial role converting inquiries into real purchases. "We are not going to speculate on whether or not the government will provide some extra relief to the industry ... how much or how little it would be or when, now or later, will it be...What we are trying to do is to be more constructive in our approach," Maruti Suzuki India Executive Director, Marketing and Sales Shashank Srivastava told PTI in an interview here. The auto industry has been asking the government for reduction of GST on automobiles to 18 per cent from 28 per cent as part of a stimulus package. Srivastava said instead of waiting for government steps, the company is focusing on what it can do to revive demand by bringing new models and also providing attractive offers to consumers. "We have launched the XL6 and we will continue to introduce new models. We will have another model coming up later," he said. Stating that the company is focusing on retail sales, Srivastava said, "We have focused on consumer offers which are at a peak. This is the best time to buy." Discounts in August will be slightly higher than what MSI had in the first quarter of the fiscal, he added without elaborating. Moreover, he said,"We are advertising with the same vigour as before." With all those actions, he said, "We are hopeful that this festival season it will turn around." Elaborating on why MSI is hopeful of a turn around this festive season, Srivastava said some uncertainty like monsoon and election that were also responsible for sales drop earlier in the year have gone. Also, the government has sought to address to an extent the liquidity issues associated with NBFCs by allowing banks to lend more to these financial institutions in the budget, he added. Moreover, Srivastava said, "We are also confident because of the number of inquiries at showrooms." The key is to convert those inquiries into purchases, he added. When asked if there's light at the end of the tunnel for the auto industry, Srivastava said, "MSI as a company, we are very optimistic that there is this light. How far it is the question. It is better to answer that, a better estimate after we see this festive season, end of October." This festive season is very critical and the industry is looking forward to it, he said. Automobile sales in India witnessed its sharpest decline in nearly 19 years in July, dropping 18.71 per cent, rendering almost 15,000 workers jobless over the past two-three months as the sector reels under a prolonged slump. Passenger vehicle sales slumped by 30.98 per cent to 2,00,790 units as compared with 2,90,931 units in the same month last year. It was the ninth month of consecutive decline. Recently, Maruti Suzuki launched its much-awaited multi-purpose vehicle (MPV) XL6 at a price starting from Rs 9.79 lakh to Rs 11.46 (ex-showroom, Delhi). Maruti Suzuki XL6 comes with a BS-VI compliant K15 petrol engine along with Smart Hybrid technology. It will be offered across two variant levels with a choice of manual and automatic transmissions. The premium MPV will be powered by a BSVI compliant 1.5-litre K15B Smart Hybrid petrol engine that will deliver 105 hp and 138 Nm of torque. It will be offered with manual as well as automatic transmission options. Manual trims are priced at Rs 9.79 lakh and Rs 10.36 lakh while the automatic versions are tagged at Rs 10.89 lakh and Rs 11.46 lakh respectively. It comes with six seat configurations with captain seats in second row. (With inputs from PTI) For all the Latest Auto News News, Cars News, Download News Nation Android and iOS Mobile Apps. First Published : 24 Aug 2019, 08:16:30 PM Maruti Suzuki Diwali Discount
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Q: Android Google Map API v2 = Non full screen Map I am trying to add Google Map API v2 to my app and having a bit of difficulty. I want the map to not take up the full screen but rather just be a certain size that I'll determine. There will be other things on the view besides just this map. Currently I have the following code, and it just keeps showing me a blank map. I believe this is because I guess I'm mixing v1 and v2 properties. I don't think this is a key problem. My code: <?xml version="1.0" encoding="utf-8"?> <ImageButton android:id="@+id/splash_logo" android:layout_width="wrap_content" android:layout_height="wrap_content" android:src="@drawable/logo_need2buythis" android:layout_marginBottom="16dp" android:layout_gravity="center_horizontal" android:background="@android:color/transparent"/> <LinearLayout android:id="@+id/main_menu_local_button" style="@style/MainMenuOptionContainer" android:layout_width="match_parent" android:layout_height="wrap_content" android:orientation="vertical" android:padding="8dp"> <TextView android:id="@+id/add_location_current" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_marginBottom="8dp" android:textStyle="bold" /> <com.google.android.gms.maps.MapView android:id="@+id/add_location_map_view" android:layout_width="fill_parent" android:layout_height="300dp" /> </LinearLayout> public class AddLocationFragment extends Fragment { public static final String TAG = "com.myapp.android.myapp.AddLocationFragment"; MapView mapView; GoogleMap map; public static AddLocationFragment newInstance() { Bundle args = new Bundle(); AddLocationFragment fragment = new AddLocationFragment(); fragment.setArguments(args); return fragment; } @Override public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); } @Override public View onCreateView(LayoutInflater inflater, ViewGroup parent, Bundle savedInstanceState) { View v = inflater.inflate(R.layout.fragment_add_location, parent, false); TextView currentLocationText = (TextView) v.findViewById(R.id.add_location_current); mapView = (MapView) v.findViewById(R.id.add_location_map_view); mapView.onCreate(savedInstanceState); // Gets to GoogleMap from the MapView and does initialization stuff map = mapView.getMap(); map.getUiSettings().setMyLocationButtonEnabled(false); map.setMyLocationEnabled(true); MapsInitializer.initialize(this.getActivity()); // Updates the location and zoom of the MapView CameraUpdate cameraUpdate = CameraUpdateFactory.newLatLngZoom(new LatLng(43.2137, -77.4358), 10); map.animateCamera(cameraUpdate); return v; } }
{ "redpajama_set_name": "RedPajamaStackExchange" }
Whoops! We forgot to wish you a Happy New Year, although those looking for a quick and easy way to get ArianeB in the sack will not really care for these wishes. So let's get on with it because some believe this is the final year of our universe. A spin-off of the ArianeB series are the comics that can be found under the title Ariane Barnes: Aspiring Video Game Star. Thirteen comics have been published so far, mostly with a gentle nod from the gaming to the real world. They range from the amusing to the brilliant and we still have a soft spot for number seven as it is so damn realistic in a funny way. It took the creator three years to make this new comic and it contains a mild sarcastic stab to those fans who think that the new ArianeB should still look like her previous incarnation. But the best news is about the sequel that has finally found a name: Something's In The Air. You can read all about it at the latest blog post of the ArianeB domain: The sequel has a title. The new version will have 6 main stories, five that can be played in random order and a sixth that will only be opened when the other 5 have successfully ended. Within the next six months a demo of the first chapter should be published and work on the other chapters will be finalised at a later stage. So splendid news for us, Ariane-lovers. But something in the six-story-set-up is nagging us and we wouldn't be surprised that only the first demo will be for free and that some additional chapters will turn into a commercial venture. There's nothing against that, obviously, there have been enough ArianeB clones around that all asked a fair amount of money to be played, while the high-quality original has been free for as long as we can remember. In the meantime the first adventure of ArianeB can be found at arianeb dot com, playable online or as a download: Go on a virtual date with me, Ariane .
{ "redpajama_set_name": "RedPajamaC4" }
Q: Adding Calculated Fields Together For the Case Statement that is adding together two calculated fields, I need to suppress results that render anything less than 0. Essentially, if the Case Statement produces anything less than $0, then suppress, Else give me the number: SELECT DISTINCT @intMonth AS strMONTH , @intYEAR AS strYEAR , 'LN' AS ApplID , lhmt.ACCOUNT_NUMBER AS AccountNbr , COUNT(lhmt.ACCOUNT_NUMBER) AS NbrofFees , 'Payoff Quote Fee' AS Description ,CASE WHEN lhmt.TRANSACTION_CODE_1 = 65 AND lhmt.TRANS_AMT_1 >0 THEN SUM(lhmt.TRANS_AMT_1) ELSE 0 END - CASE WHEN lhmt.TRANSACTION_CODE_1 = 46 AND lhmt.TRANS_AMT_1 >0 THEN SUM(lhmt.TRANS_AMT_1) ELSE 0 END AS TotalFees FROM dbo.T_LOAN_HISTORY_MONETARY_TRANS lhmt A: I think you could simply wrap your original query into a common table expression and then select from the common table expression and include a case expression on TotalFees. Something like ;With _cte as ( SELECT DISTINCT @intMonth AS strMONTH , @intYEAR AS strYEAR , 'LN' AS ApplID , lhmt.ACCOUNT_NUMBER AS AccountNbr , COUNT(lhmt.ACCOUNT_NUMBER) AS NbrofFees , 'Payoff Quote Fee' AS Description ,CASE WHEN lhmt.TRANSACTION_CODE_1 = 65 AND lhmt.TRANS_AMT_1 >0 THEN SUM(lhmt.TRANS_AMT_1) ELSE 0 END - CASE WHEN lhmt.TRANSACTION_CODE_1 = 46 AND lhmt.TRANS_AMT_1 >0 THEN SUM(lhmt.TRANS_AMT_1) ELSE 0 END AS TotalFees FROM dbo.T_LOAN_HISTORY_MONETARY_TRANS lhmt ) SELECT strMONTH , strYEAR , ApplID , AccountNbr , NbrofFees , Description ,case when TotalFees < 0 then 0 else TotalFees end as TotalFees from _cte
{ "redpajama_set_name": "RedPajamaStackExchange" }
These bars are perfect for the gluten sensitive customer! Stop in for one of our super delicious peanut butter bars. Packed with crunchy roasted peanuts, creamy peanut butter, Rice Krispies and honey, these bars are then drizzled in chocolate making for one sweet treat.
{ "redpajama_set_name": "RedPajamaC4" }
Create Your Own Personalized Custom Funko Pop Soon! Posted by Ryan Bueta | Dec 8, 2020 | Collectibles, News | 0 Having or collecting Funko Pops have become a norm in the pop culture and entertainment world. The hugely successful toy brand have made numerous statues based on TV, movie, video games, comics, and other fictional characters in the entertainment industry. Even well known celebrities and professional athletes are getting their own miniature Funkos. But have you ever wished or wondered that you could create your own Funko Pop or "Mini Me"? Well it looks like your dream is about to come true. According to Funko. the company will be releasing and launching POP! POP will be a silo factory of multiple customized figurines that will allow customers create Funko Pop stylized figurines of themselves. The company announced that starting in December 11 that their Funko headquarters located in Hollywood and Everett will have these mini Pop Factories for customers. According to Funko, these mini factories will be kiosks. These kiosks will display Funko pieces, and customers will have to fill out order forms to get their piece selections. After customers complete their forms, they would bring that same order form to a POP Factory counter for it to process. The Pop-Abilities are endless! Pop! Your Peeps with Pop! People coming soon to Funko HQ and Funko Hollywood! #Funko #FunkoPop #Poppeople #FunkoHQ #FunkoHollywood pic.twitter.com/wnzmUdXFbI — Funko (@OriginalFunko) December 1, 2020 Then as soon as POP Builder is finished making the customized figure, customers will be then contacted and can pick up the personalized figure in a customized box. The price of these customized personalized Funko Pop is said to be $25.00. This format is similar to a plush toy factory like Build-A-Bear where customers can make their own customizable teddy bear or animal. As of now it's not announced what other Pop Store will have these POP factory kiosks. Rise of the Funko Pop Funko Pops were created by Funko Inc. and the company was founded in 1998 by founder Mike Becker. Becker began as a t-shirt designer in Snohomish, Washington. Becker started making collectibles and had a idea in creating a food bank based on the American fast food icon, Big Boy. Due to replicas being expensive in online websites such as Ebay, Becker decided to make his own customized collectibles. In 2005 Becker sold his company to an entrepreneur and huge collectible fan Brian Mariotti. Thanks to Mariotti, the Funko company became the successful brand known today. Funko Pops were created and first released in 2010 at San Diego Comic Con. RELATED: BABY YODA'S 1ST BUILD-A-BEAR COMING SOON DUE TO PUBLIC DEMAND FOR ADORABLE CHARACTER The first Funko Pops were DC's Batgirl, Green Lantern, and two variations of Batman. Due to its massive success during launch the Pop's became popular. Funko Inc. has made more than 8,200 different Funko Pops and is still going strong today, thus creating a lasting legacy. The Funko Pop Legacy Funko Pop's have become one of the prime targets for toy collecting. With pop culture and entertainment industry in a new era of renaissance, it's not really surprising these simple adorable miniaturized figures are a collector's staple. TV, movies, and video games are becoming more well known due to the help of Funko Pops. Entertainment genre's such as superhero, action, sci-fi, horror, fantasy, and comedy are making these little figurines a hot commodity in many establishments as well. The places where Funko Pops can be easily found include comic conventions, comic book stores, video games stores, and common retail stores. Even well known celebrities and professional athletes are getting their own Funko Pops. These celebrities includes Marilyn Monroe, Post Malone, Lil Wayne, Eric "Eazy-E" Wright, Shawn Mendes, Stephen King, John Cena, Stan Lee, Prince, Elvis Presley, Michael Jackson, and many more. Professional athletes include Clayton Kershaw, Tiger Woods, Cody Bellinger, Magic Johnson, Larry Bird, Kobe Bryant, Lebron James, Anthony Davis, Michael Jordan, Patrick Mahomes, Walter Payton, and Michael Jordan. The era and rise of the Funko Pops is here. Are you going to get a personalized Funko Pop? If you do, post a picture on Twitter and let us take a look! KEEP READING: BABY YODA'S 1ST BUILD-A-BEAR COMING SOON DUE TO PUBLIC DEMAND FOR ADORABLE CHARACTER Source: /Film PreviousNew Eternals Toys Give a More Detailed Look at the Marvel Superheroes NextSpider-Man 3: Former Heroes Tobey Maguire, Andrew Garfield, Emma Stone And Kirsten Dunst To Join Epic Sequel Ryan Bueta Just an average person that loves all thing Pop Culture. I graduated with a Bachelor's of Science In Public Health at California State University Northridge. Was exposed to Pop Culture Media in October 2015 at Los Angeles Comic Con (Formerly Stan Lee's Comikaze). Started being involved in the Pop Culture journalistic world by interviewing Power Rangers Actors in 2016. Then I created my own Social Media Outlet called Morphin Network where me and my team interview former Power Rangers actors, and report Power Rangers related news. Now currently I am a creative writer for the Illuminerdi Wonder Woman 1984 Has A Secret Ending No One Has Seen Yet Scorpina Enters Power Rangers Battle For The Grid Today The Legend of Korra is Coming to Netflix in August Following Avatar: The Last Airbender's Resurgence AT&T's Gaming Division, Warner Bros Interactive Entertainment, For Sale Is WandaVision's Ralph Secretly The Menacing Mephisto In Disguise? New Black Panther 2 Rumors And Plot Details Surface
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Q: SQL Filtrar relacion muchos a muchos según varios valores sobre el mismo campo tengo las tablas personas, materias y personas_materias con una relacion muchos a muchos. Necesito hacer un query para seleccionar personas que estan en dos materias diferentes. Ejemplo de lo que he probado SELECT * FROM persona p JOIN personas_materias pm1 ON p.id = pm1.idPersona JOIN materia m1 ON pm1.idMateria = m1.id AND m1.nombre = 'INGLES' JOIN personas_materias pm2 ON p.id = pm2.idPersona JOIN materia m2 ON pm2.idMateria = m2.id AND m2.nombre = 'MATEMATICA' Pero lo estoy plantenado mal porque no funciona. Me podrían guiar un poco? Muchas gracias A: Prueba esta consulta SELECT materia.nombre as Materia materia.nombre as Persona FROM materia m INNER JOIN personas_materias pm ON m.id = pm.idMateria INNER JOIN persona p ON p.id = pm.idPersona en caso que quieras agregar una condición solo tienes que agregar un where a la consulta SELECT materia.nombre as Materia materia.nombre as Persona FROM materia m INNER JOIN personas_materias pm ON m.id = pm.idMateria INNER JOIN persona p ON p.id = pm.idPersona WHERE m.nombre = "MATEMATICA" A: he replicado tu modelo y estos son los datos de prueba con los que he trabajado: Tabla de materias con los siguientes datos: Tabla de Usuarios con los siguientes datos: Le he asignado 3 materias al usuario con id 1 Y finalmente con un inner simple, he capturado los datos de todos los usuarios en la tabla de relación. Claro, aquí puedes hacer los where que necesites, pero los inner que necesitas son los que están en la siguiente query: Saludos! A: Tienes diferentes maneras de realizar esta consulta. La primera es utilizando JOIN y la segunda SUBQUERIES. De lo que entiendo, necesitas obtener una lista de personas que están matriculadas en INGLES y MATEMATICAS. Si esto es correcto, te envío las siguientes consultas: 1. JOIN: utilizando JOIN, los registros se multiplicarán por la cantidad de materias que tenga una persona. Es decir, si John Doe está matriculado en 2 materias, aparecerá 2 veces. Si Jane Doe esta en 4 materias, aparecerá 4 veces. SELECT * FROM persona p JOIN personas_materias pm1 ON p.id = pm1.idPersona JOIN materia m1 ON pm1.idMateria = m1.id AND m1.nombre IN ('INGLES', 'MATEMATICA') SELECT * FROM persona p JOIN personas_materias pm1 ON p.id = pm1.idPersona JOIN materia m1 ON pm1.idMateria = m1.id WHERE m1.nombre IN ('INGLES', 'MATEMATICA') 2. SUBQUERIES: Con subqueries y la condición EXISTS te permitirá mostrar los registros de la tabla persona que cumplan con la condición del subquery. SELECT * FROM persona p WHERE EXISTS ( SELECT 1 FROM personas_materias pm1 JOIN materia m1 ON pm1.idMateria = m1.id WHERE pm1.idPerson = p.id AND m1.nombre IN ('INGLES', 'MATEMATICA') )
{ "redpajama_set_name": "RedPajamaStackExchange" }
It was a short notice to call Ozul photography, but then they responded very quick and reliable! we had great fun time during our Engagement taking this and that pictures.. haha! also they are very easy to talk to and of course not to mention their work results! perfectly match our needs and wants! cant very much recommended! Established in August 2017 Özul is a newcomer in photography business. However, even we are still new in this business, our crew has a long experience and a good portofolio in photo and videography. We provide event documentation, Prewedding, maternity, baby, and family photoshoot. We found that, for those kind of services are costly. Therefore we are here to provide a high quality photo with affordable price. So that everyone can have a good photo without spending too much money.
{ "redpajama_set_name": "RedPajamaC4" }
Click here for the latest info on COVID-19 in Brazil. Salvador is the capital of the state of Bahia, a place renowned for its natural beauty, friendliness of its people, and the strong influence of African culture. The moves associated with Capoeira, a cultural expression that combines fighting and dancing, the smells and flavors of the local cuisine, the melting pot of different religions, cultural diversity, and natural beauty, all of it combined defines the local population: friendly people that really know the true meaning of enjoying life. The city also hosts one of the country's most famous carnival celebrations. Capoeira, a cultural expression that combines fighting and dancing The Historic Center of Salvador is a place where visitors will find streets and architectural monuments that date back to Colonial Brazil, the Empire, and the First Republic. Containing the neighborhoods of Sé, Pilar, and Pelourinho (added to Unesco's World Cultural Heritage List), the region is culturally rich and the home to historic monuments from the period between the 17th and 19th centuries, making it a very popular destination with tourists looking for museums, theaters, churches, musical performances, local cuisine, and handicrafts. There are more than 300 churches in Salvador. One of them is São Francisco Church and Convent. Classified as one of the Seven Wonders of Portuguese Origin in the World and on the National Institute of Historic and Artistic Heritage List, the place displays 18th-century tiles that tell the story of Saint Francis of Assisi's birth. The tiles are decorated with sculpted wooden pieces coated with gold powder. Another important attraction is the Basilica of Senhor do Bonfim, patron of Bahia and the symbol of the state's religious diversity. In Salvador, Catholicism coexists in harmony with African religions, bringing together Iemanja and Our Lady of the Immaculate Conception, Iansã and Saint Barbara, Our Lord of Bonfim and Oxala. African culture is also present in music, dance, and local cuisine, which is rich and diverse. While in town, make sure you try the typical local dishes: acarajé, (a type of fritter made with black-eyed peas), caruru (made with okra, onions, shrimp, palm oil, and toasted nuts), and vatapá (a creamy dish made with shrimp, coconut milk, finely ground peanuts, and palm oil). They can be bought straight from the baianas (Afro-Brazilian women who, since colonial times, have sold food on the streets of Salvador). Salvador is the best gateway for those who intend to visit the Coconut Coast (Costa dos Coqueiros), the Palm Oil Coast (Costa do Dendê), and Chapada Diamantina National Park. You will find wonderful places in Bahia where nature is beautifully preserved. The state also has a variety of charming resorts and lodges that boast perfect infrastructure to host tourists. Before traveling, make sure you are aware of all the local reopening protocols for the destination and local attractions. Travel safe! The International Airport of Salvador receives domestic flights from most Brazilian capitals, as well as international flights. The Salvador Bus Terminal is located in the central area of the city and operates local and interstate bus routes. By Boat | Ferry The Port of Salvador receives cruises from several countries around the world. Please check with the operating companies. By Subway The Subway in Salvador currently has two lines and operates on a daily basis from 5 A.M. to midnight, including weekends and holidays. Customer Service: 0800 071 8020 Check the itinerary of the Bus Routes in Salvador. The double-decker Tour Bus is a great choice to see the city as well. Personal Vehicles or Rentals A good way to get around the city and to visit nearby destinations is to rent a car. Taxis and Ridesharing Companies Taxis and ridesharing companies are a comfortable way to get around the city of Salvador. Bahia Tourist Hotline: Tourist Information Center – Pelourinho: Tourist Information Center – Airport: Tourist Information Center – Bus Terminal: Military Police: 190 Paramedics: 192 Fire Department: 193 Bahia! Bahia Department of Tourism Tips for Tourists in Salvador Power Voltage Salvador has tropical weather, with regular rainfall throughout the year and no specific dry season. The average temperature is around 25°C. Despite the high temperatures, the breeze coming from the Atlantic Ocean makes it all better even on the hottest days. We use cookies and other similar technologies on our website to improve your experience while using our services, customize advertising, and recommend content that may be of interest to you. By clicking "accept all", you are allowing the use of the cookies. However, you can visit the "cookie settings" page to choose your own personalized settings.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
<?php /** * Product attributes grid * * @author Magento Core Team <[email protected]> */ namespace Magento\Catalog\Block\Adminhtml\Product\Attribute; use Magento\Eav\Block\Adminhtml\Attribute\Grid\AbstractGrid; class Grid extends AbstractGrid { /** * @var \Magento\Catalog\Model\Resource\Product\Attribute\CollectionFactory */ protected $_collectionFactory; /** * @param \Magento\Backend\Block\Template\Context $context * @param \Magento\Backend\Helper\Data $backendHelper * @param \Magento\Catalog\Model\Resource\Product\Attribute\CollectionFactory $collectionFactory * @param array $data */ public function __construct( \Magento\Backend\Block\Template\Context $context, \Magento\Backend\Helper\Data $backendHelper, \Magento\Catalog\Model\Resource\Product\Attribute\CollectionFactory $collectionFactory, array $data = [] ) { $this->_collectionFactory = $collectionFactory; $this->_module = 'catalog'; parent::__construct($context, $backendHelper, $data); } /** * Prepare product attributes grid collection object * * @return $this */ protected function _prepareCollection() { $collection = $this->_collectionFactory->create()->addVisibleFilter(); $this->setCollection($collection); return parent::_prepareCollection(); } /** * Prepare product attributes grid columns * * @return $this */ protected function _prepareColumns() { parent::_prepareColumns(); $this->addColumnAfter( 'is_visible', [ 'header' => __('Visible'), 'sortable' => true, 'index' => 'is_visible_on_front', 'type' => 'options', 'options' => ['1' => __('Yes'), '0' => __('No')], 'align' => 'center' ], 'frontend_label' ); $this->addColumnAfter( 'is_global', [ 'header' => __('Scope'), 'sortable' => true, 'index' => 'is_global', 'type' => 'options', 'options' => [ \Magento\Catalog\Model\Resource\Eav\Attribute::SCOPE_STORE => __('Store View'), \Magento\Catalog\Model\Resource\Eav\Attribute::SCOPE_WEBSITE => __('Web Site'), \Magento\Catalog\Model\Resource\Eav\Attribute::SCOPE_GLOBAL => __('Global'), ], 'align' => 'center' ], 'is_visible' ); $this->addColumn( 'is_searchable', [ 'header' => __('Searchable'), 'sortable' => true, 'index' => 'is_searchable', 'type' => 'options', 'options' => ['1' => __('Yes'), '0' => __('No')], 'align' => 'center' ], 'is_user_defined' ); $this->_eventManager->dispatch('product_attribute_grid_build', ['grid' => $this]); $this->addColumnAfter( 'is_comparable', [ 'header' => __('Comparable'), 'sortable' => true, 'index' => 'is_comparable', 'type' => 'options', 'options' => ['1' => __('Yes'), '0' => __('No')], 'align' => 'center' ], 'is_filterable' ); return $this; } }
{ "redpajama_set_name": "RedPajamaGithub" }
Located next to the medieval town and most famous wine-producing châteaux of Saint-Emilion, the Château Grand Barrail Hôtel – Restaurant – Spa offers five private function rooms (3 seminar rooms and 2 little conference rooms) to host your seminars and other events. All our function rooms are fully equipped with a video projector, screen and a paperboard. WiFi access is available. The Hotel can also provide paper, pencils, mineral water and hard candies for attendees. In a classy and refined setting, our gourmet restaurant offers high-quality, mouth-watering cuisine. Our Cinq Mondes Spa is the place to relax and recharge your batteries. Situated in La Maison du Bien-Être, the Coté Parc function room looks out over the park. The Millésime Room is located in the Château and features stone walls and a private patio. An adjoining tasting room is also available. The maximum capacity is 40 people. The Marzelle Room features stone walls and overlooks nearby vineyards. It overlooks a 115m² terrace. The maximum capacity is 85 people. This 28m² room is a quiet place to hold committee meetings or a workshop. This 18m² room features comfortable leather armchairs and sofa, and coffee tables. It can welcome up to 10 people. An original place for management committees or informal meetings.
{ "redpajama_set_name": "RedPajamaC4" }
\section{Security} The security check employing conjugate bases in purely frequency and time relies on the mutually unbiased nature of these bases; a measurement in the wrong basis reveals no information about the state in the other basis and by their conjugate nature introduces errors. We therefore seek a mutually unbiased basis to that employed in our resource-efficient scheme. Alice and Bob's coarse measurements in spectrum are described by an operator that projects subsets of spectral states onto degenerate eigenvalues $\Omega_l$. The degeneracy within these subsets is lifted by also performing measurements in time, which are described by an operator with coarse timing resolution $T_m$ that correspond to degenerate sets of eigenstates. Simultaneous eigenstates for time and spectral measurements $\ket{\Omega_l T_m}$ describe one basis set. A conjugate basis can be found that forms the second basis for measurements by Alice and Bob. Under certain conditions, a security check can be performed using simple instrumentation. For now, we assume that Eve chooses to attack by using either a Gaussian envelope in time or one in frequency, i.e., $\hat{E}_t=\int_{-\infty}^\infty e^{-t^2/2(\sigma_{coh}^{E})^2}\ket{t}\bra{t}dt$ \cite{PhysRevLett.98.060503} or $\hat{E}_\omega=\int_{-\infty}^\infty e^{-(\sigma_{cor}^{E})^2(\omega-\omega_p/2)^2}\ket{\omega}\bra{\omega}d\omega$, respectively. Eve's temporal measurement leads to a decrease in $\sigma_{coh}$, and her frequency measurement creates an increase in the biphoton correlation time, $\sigma_{cor}$. Alice and Bob can detect both of these attacks with the `extended Franson interferometer' (eFI) shown in Fig. \ref{secure}. The eFI is composed of two unbalanced Mach-Zehnder interferometers (MZI) in the possession of Alice and Bob, where the long path on one arm can be actively modulated. The probability for Alice and Bob to detect a photon coincidence in their eFI is \cite{PhysRevLett.62.2205} \begin{equation} P_C\propto \frac{1}{2}+\frac{1}{2}\cos[\omega(2\Delta t-\delta t)]e^{-\delta t^{2}/8\sigma_{cor}^{2}}e^{-\Delta t^{2}/8\sigma_{coh}^{2}}, \end{equation} \noindent where $\omega = \omega_p/2$ is the center frequency of the SPDC signal and idler photons, $\Delta t$ is the path-length difference between the long and short arm of Alice's MZI, and $\delta t$ is the path-length difference between Alice's and Bob's long arm. $\Delta t$ is large enough to avoid single photon interference between long and short paths of a single arm of the eFI, and $\delta t$ is varied on the order of $1/\omega$ about zero. The interference is plotted in Fig. \ref{secure} as a function of an additional delay in Alice's MZI. This interference curve shows the oscillations in $P_C$ that is typical of the Franson interferometer near $\delta t = 0$. In addition, this oscillation has a Gaussian envelope whose width is given by $\sigma_{cor}$. \begin{figure} \centering\includegraphics[scale=0.5]{\string"T_and_tau\string".pdf} \centering\caption{\small{The eFI used for security checks. Alice switches the short arm of her Franson between lengths $\delta t_1$ and $\delta t_2$. This allows determination of both $\sigma_{coh}$ and $\sigma_{cor}$ so that weak spectral and temporal measurements on the photon pair can be detected. Alice and Bob do security checks by varying $\delta t$ as shown in the insets. We show one possible switching scheme that makes use of Pockels cells (PC) to rotate the polarization of the photon by $\pi/2$ so that it is either transmitted or reflected at the polarizing beam splitter (PBS) and sent to the extended or standard delay line, respectively. The eFI also includes non-polarizing beam splitters (BS) and single photon detectors (D).}} \label{secure} \end{figure} The visibility of the eFI interference is $V=e^{-\delta t^{2}/8\sigma_{cor}^{2}}e^{-\Delta t^{2}/8\sigma_{coh}^{2}}$. If Eve measures in the temporal domain with a resolution better than $\Delta t$, then Alice and Bob can detect a drop in $V$ near $\delta t =0$; this is the security check used by Kahn \emph{et. al} in Ref. \cite{PhysRevLett.98.060503}. On the other hand, if Eve measures in the spectral domain with a resolution better than $\Delta\Omega$, then Alice and Bob can detect an increase in $V$ near $\delta t =\sigma_{cor}$. To guard against temporal and spectral measurements by Eve simultaneously, Alice and Bob measure $V$ while Alice switches randomly between delays of 0 and $\sigma_{cor}$ (see Fig. \ref{secure}). Alice and Bob can deduce the correlation time and coherence time from two visibility measurements $V_1$ and $V_2$ using two delays, $\delta t_1$ and $\delta t_2$, respectively. We label these extrapolated values $\sigma_{coh}^{E'}$ and $\sigma_{cor}^{E'}$, which are given by \begin{equation} (\sigma_{cor}^{E'})^2=\frac{1}{8}\frac{\delta t^2_1-\delta t^2_2}{\ln V_2 - \ln V_1} \end{equation} \begin{equation} (\sigma_{coh}^{E'})^2=\frac{1}{8}\frac{\Delta t^2(\delta t^2_1-\delta t^2_2)}{\delta t^2_1\ln V_2 - \delta t^2_2\ln V_1}. \end{equation} Using $(\sigma_{coh}^E)^2=1/[(\sigma_{coh}^{E'})^{-2}-\sigma_{coh}^{-2}]$ and $(\sigma_{cor}^E)^2=1/[(\sigma_{cor}^{E'})^{-2}-\sigma_{cor}^{-2}]$ derived from this measurement, the bound on Eve's information per photon is $I_E\le\log_2 (\sigma_{coh}/\sigma_{coh}^E)+\log_2 (\sigma_{cor}^E/\sigma_{cor})$, which is the sum of her information obtained from temporal and spectral measurements. Our assumption of a Gaussian form of Eve's POVM will be generalized in future work. \section{Conclusion} The often limited photon budget for quantum key distribution makes high-dimensional encoding desirable. However, achieving the limit on this dimensionality in the temporal domain using time-frequency entangled photon pairs requires detectors with sub-ps timing jitter and resolution. By invoking conjugate spectral correlations, we present a protocol to approach this fundamental limit using current detectors and existing telecom networks. The conjugate nature of temporal and spectral encoding means that one can trade spectral for temporal bits (and vice versa) to minimize the effect of channel distortion such as nonlinear frequency conversion and dispersion, in addition to optimizing over transmission rate and channel bandwidth. \\\\ This work was supported by the DARPA Information in a Photon program, through grant W911NF-10-1-0416 from the Army Research Office. \section{Methods} \subsection{Mutual information} \label{sec:MI} Alice and Bob ideally communicate information by discretizing the wave function into agreed-upon time-bin $\ket{\sigma_{bin}^i}$ and frequency-bin $\ket{\nu^i}$ macrostates by \begin{equation} \ket{\bar{\Psi}}=\sum_{i,j,k,l}G^{i,j,k,l}\ket{\sigma_{bin,A}^{i},\sigma_{bin,B}^{j},\nu_A^k,\nu_B^l}, \end{equation} where \begin{equation} G^{ijkl}=\int_{i\sigma_{bin}}^{(i+1)\sigma_{bin}}\!\int_{j\sigma_{bin}}^{(j+1)\sigma_{bin}}\textnormal{FT}_2\left[\int_{k\delta\nu}^{(k+1)\delta\nu}\!\int_{l\delta\nu}^{(l+1)\delta\nu}\psi(\omega_A,\omega_B)d\omega_Ad\omega_B\right] dt_A dt_b \end{equation}. The probability of Alice and Bob projecting into time bins $\ket{\sigma_{bin,A}^i}$ and $\ket{\sigma_{bin,B}^j}$ and frequency bins $\ket{\nu_A^k}$ and $\ket{\nu_B^l}$ is $p^{i,j,k,l}=|\bra{\sigma_{bin}^i,\sigma_{bin}^j,\nu_A^k,\nu_B^l}\bar{\Psi}\rangle|^2=|G^{i,j,k,l}|^2$. We label the frequency bins so that for $k=l$, the center frequencies of these bins add to the pump frequency. We plot the mutual information in Fig. \ref{jitter}b as a function of the number of spectral channels added. The wave function is a two-dimensional Gaussian. As we increase the number of spectral channels, the mutual information (MI) increases, however the timing correlations eventually start to decrease, as the filtered photons extend into neighboring time bins. Jitter is also a very important to the MI calculation. We include this in the inset to Fig. \ref{jitter}b. \subsection{Detector timing jitter} Detector timing jitter refers to the added uncertainty in the photon detection time of some stimulus, purely a result of detector electronics. Superconducting nanowire single photon detectors and InGaAs APDs both exhibit jitter of roughly 30 to 40 ps \cite{Hadfield_single_photon}. We model timing jitter as a Gaussian projection, $\hat{\sigma}_{det}=\int e^{-t_x^{2}/2\sigma_{det}^{2}}\ket{t}\bra{t+t_x}dt_x$. The jitter profile of a real photodetector is not truly Gaussian and can be quite asymmetric, however (1) this model allows for first-order analysis and (2) certain single photon detectors do have approximately Gaussian timing jitter \cite{4277352}. If we apply $\hat{\sigma}_{det}$ on both Alice and Bob's photons, assuming the two-dimensional Gaussian given earlier, we get \begin{equation} \hat{\sigma}_{det,A}\hat{\sigma}_{det,B}\ket{\Psi} \propto \int^\infty_{-\infty}\int^\infty_{-\infty}\exp\left[\frac{-(t_A+t_B)^2}{4\sigma_{det}^2+16\sigma_{coh}^2}\right]\exp\left[\frac{-(t_A-t_B)^2}{4\sigma_{det}^2+4\sigma_{cor}^2}\right]e^{i\omega_p(t_A+t_B)/2}\ket{t_{A},t_{B}}dt_{A}dt_{B} \end{equation} Since $\sigma_{coh} \gg \sigma_{det}$, the most important effect of jitter is to increase the observed correlation time roughly from $\sigma_{cor}$ to $\sigma_{det}$. This can have a significant effect on the mutual information between Alice and Bob if $\sigma_{det}$ is on the order of $\sigma_{bin}$, as shown in Fig. \ref{jitter}b. \section{Supplementary Information} \subsection{Lossy Franson interferometry} The Franson interference derived in the text assumes lossless propagation through the interferometer. This assumption is not valid in photonic integrated chips or fiber networks. We can account for loss in our analysis by adding a virtual beam splitter in the long path of the otherwise-lossless Franson, which couples the waveguide mode with a vacuum mode (see Fig. \ref{lossy}). We work in the Heisenberg construction, evolving the annihilation operator through the virtual-loss beam splitter and the two Franson beam splitters. The matrix for beam splitters 1 and 2, which leave the third mode undisturbed is given by \begin{equation} \hat{U}_i = \left(\begin{matrix} \sqrt{r_i}&\sqrt{1-r_i}&0\\\sqrt{1-r_i}&-\sqrt{r_i}&0\\0&0&1 \end{matrix}\right) \end{equation} \noindent where $i\in{1,2}$. The virtual-loss beam splitter is given by \begin{equation} \hat{U}_L = \left(\begin{matrix} 1&0&0\\ 0&\sqrt{t_L}&\sqrt{1-t_L}\\0&\sqrt{1-t_L}&-\sqrt{t_L}\\ \end{matrix}\right) \end{equation} \begin{figure} \begin{centering} \includegraphics[scale=0.5]{\string"lossy_franson\string".pdf} \par\end{centering} \caption{\small{The eFI with an additional virtual beam splitter for loss in the long arm.}} \label{lossy} \end{figure} The resulting annihilation operators are then $\hat{a}_A(t_A)=C_1\hat{a}(t)+C_2\hat{a}(t-\Delta t)$ and $\hat{a}_B(t_B)=C_1\hat{a}(t)+C_2\hat{a}(t-\Delta t - \delta t)$, disregarding the vacuum term, which will not affect coincidence counting. $C_1=\sqrt{r_1}\sqrt{r_2}$ and $C_2=\sqrt{1-r_1} \sqrt{1-r_2} \sqrt{t_L}$. For $r_1=r_2=1/2$, and $t_L=e^{-2t/\tau_\alpha}$ where $\tau_\alpha$ is the lifetime of the photon in the interferometer arm, the visibility simplifies to \begin{equation} V_{PIC}=\frac{2e^{-2\Delta t/\tau_{\alpha}}}{1+e^{-4\Delta t/\tau_{\alpha}}}e^{-\delta t^{2}/2\sigma_{cor}^{2}}e^{-\Delta t^{2}/2\sigma_{coh}^{2}}. \end{equation} However for maximum visibility, $C_1=C_2$, so \begin{equation} \frac{\sqrt{r_1}\sqrt{r_2}}{\sqrt{1-r_1} \sqrt{1-r_2}}=\sqrt{t_L}. \end{equation} The Franson beam splitters can therefore be tuned to account for loss in the interferometer. \subsection{Eve and the wave function} We focus on the case of a single eavesdropper measuring a single photon of the photon pair. Eve's temporal measurement is a Gaussian filtering function \begin{equation} \hat{E}_t=\int_{-\infty}^\infty e^{-t^2/2(\sigma_{coh}^{E})^2}\ket{t}\bra{t}dt \end{equation} Following \cite{PhysRevLett.98.060503}, the amplitude function \begin{equation} \psi(t_A,t_B)\propto \exp[-(t_A-t_B)^2/4\sigma_{cor}^2]\exp[-t_A^2/4\sigma_{coh}^2]e^{i\omega_p(t_A+t_B)/2}, \end{equation} for $\sigma_{coh}\gg \sigma_{cor}$. Therefore \begin{eqnarray} \ket{\Psi_E} &=& \hat{E_t}\ket{\Psi} \\ &\propto& \int^\infty_{-\infty}\int^\infty_{-\infty}\exp\left[-t_A^2\left(\frac{1}{4\sigma_{coh}^2}+\frac{1}{4(\sigma_{coh}^{E})^2}\right)\right]\exp\left[\frac{-(t_A-t_B)^2}{4\sigma_{cor}^2}\right]e^{i\omega_p(t_A+t_B)/2}\ket{t_{A},t_{B}} \nonumber \end{eqnarray} so the coherence time of the biphoton packet is strongly influenced by Eve's timing resolution when $\sigma_{coh}^E\ll\sigma_{coh}$. Similarly, we define a weak spectral POVM, \begin{equation} \hat{E}_\omega=\int_{-\infty}^\infty e^{-(\sigma_{cor}^{E})^2(\omega-\omega_p/2)^2}\ket{\omega}\bra{\omega}d\omega \end{equation} For $1/\sigma_{cor}\gg1/\sigma_{coh}$, $\ket{\Psi}$ can be written in the spectral-domain representation as follows \begin{equation} \ket{\Psi}\propto\int\int\exp[-\sigma_{cor}^{2}/4(2\omega_{A}-\omega_{p})^{2}]\exp[-\sigma_{coh}^{2}(\omega_{A}+\omega_{B}-\omega_{p})^{2}]\ket{\omega_{A},\omega_{B}} d\omega_{A}d\omega_{B}, \end{equation} from which we find that \begin{eqnarray} \hat{E}_\omega\ket{\Psi}\propto\int\int\exp[-(\sigma_{cor}^{2}/4+(\sigma_{cor}^{E})^{2}/4)(2\omega_{A}-\omega_{p})^{2}]\\\nonumber \times\exp[-\sigma_{coh}^{2}(\omega_{A}+\omega_{B}-\omega_{p})^{2}]\ket{\omega_{A},\omega_{B}} d\omega_{A}d\omega_{B}. \end{eqnarray} Thus, Eve projects the biphoton pair onto a narrower frequency distribution. Reverting to the time-domain representation we get \begin{equation} \hat{E}_\omega\ket{\Psi}\propto \int\int\exp(-t_A^2/4\sigma^2_{coh})\exp[-(t_A-t_B)^2/4(\sigma_{cor}^E)^2]e^{i\omega_p(t_A+t_B)/2}\ket{t_A,t_B}dt_Adt_B, \end{equation} for $\sigma_{cor} \ll \sigma^E_{cor} \ll \sigma_{coh}$. \bibliographystyle{apsrev_no_links.bst}
{ "redpajama_set_name": "RedPajamaArXiv" }
After a while the songs became more like songs than poems set to music, and John started playing them for his friend Rachel, who as it turned out, played bass. John and Rachel toured the eastern U.S. & Europe once, the midwest twice (if "Chicago, Columbus and Madison" count as "the midwest"), and played San Francisco a few times, and they recorded two albums and a couple of EPs. Then John graduated from college and moved to Chicago, and the Mountain Goats became Mainly Just John, except for a couple of European tours where John's friend Peter Hughes played bass. In 2001, though, 4AD called up and asked if the Mountain Goats wouldn't like to make records with them. John called Peter. They hit the studio.
{ "redpajama_set_name": "RedPajamaC4" }
When you buy one or receive one, it is preloaded with a set amount of cash. Debt consolidation is a strategy to roll multiple old debts. How to buy a home with little money down and bad credit Need to report the video? CreditOneBank.com and the Credit One Bank mobile app makes it easy to access and manage all your account information and make payments whether you're at home or on-the-go Credit One Bank allows you to choose your monthly payment due date. And if multiple credit cards may tempt you to overspend and incur debt, then you should focus on managing just a single card at one time Credit cards to help build or rebuild credit can credit in bank account means create a successful financial future when handled responsibly. Remember, Clearpoint wants you to know how to pay off debt on your own if at all possible. Toggle navigation. The extent to which a judgment creditor can pursue a consumer is a function of state law, with each state granting creditors slightly different options for pursuing judgments. Free Legal Consultation. If you keep using your cards and adding to your balance, you may never get out of debt at all Balance transfer credit cards offer low introductory APRs that can help you pay your balance down faster. That's when you'll have to fight to get your credit restored and your name cleared, an arduous process that can take months or years to complete Help prevent fraud by alerting local law enforcement, your bank, your credit card issuers, your medical insurer, your state's DMV and other appropriate agencies as soon as you realize you have a lost wallet or stolen wallet situation on your hands Identity theft protection companies help consumers spot abnormal activity with their credit cards, bank accounts, social security information and more to repair and resolve issues regarding. To help us locate your file, you will need to provide the following information. Users are automatically given a credit of $50 upon the first purchase or. As of 2017, it costs $59.85 for your score and reports from all three CRAs All the same, creditors and other credit in bank account means companies don't necessarily take the time to report to all three bureaus. Flexibility: Access your line of credit up to 10 years, followed by a 20-year repayment period. That said, you can still get a good deal on a credit card with a credit score in the high six hundreds Choose from the entire collection of Citi Visa credit cards to find one that fits your needs. When I started working with my daughter her credit score was 533 due to late payments on her student loan and a medical collection of $135. Get FREE alerts to changes in your D&B ® scores and ratings. In this Agreement "we," "us," and "our" mean Target National Bank.. Three national credit agencies, Experian, Equifax and Transunion, report your credit history to lenders and other parties Applying for a credit card, car loan, or other type of loan also results in an inquiry that can lower your score, so try to avoid applying for these other types of credit right before getting a mortgage or during the mortgage process.. Our research indicates that the Citi Simplicity® Card is the best balance transfer credit card because of its exceptionally long 0% intro APR period, which can save you thousands What to look for in a 0% intro APR credit card offer. The reversal then appears as a credit to the account on the account holder's bank statement. Discover it ® Student Cash Back is a good choice of credit card if you want to earn cash back rewards and track recent FICO ® credit scores for free online and on monthly statements. Once you've received your annual free credit report, you can still request additional reports. Pay the most expensive balance first. Then you can attack the second credit card to the tune of $175 per month ($100 plus the newly freed-up $25, plus the $50 payment you're already making).. Business credit cards report to business credit bureaus, and are very useful for building a credit history for your business. Step. Unfortunately, some offers are credit in bank account means sent directly to you from a list owned by the offerer or another party I don't know if opting out of spam automatically opts you out of credit card offers, but if you think you may have opted out of prescreened offers, you can always opt back in How to reduce credit card offers and mailings. An authorized user on a credit card account is any person you allow to access your credit card account. TransUnion 8: 608. Pay nothing. With a Peerform debt consolidation loan, you can place all of your debts—credit cards, car loans, student loans—into one easy to manage loan. If you're planning to buy credit in bank account means a house or car soon, checking your credit score more often will help you be prepared This app uses the Experian reporting agency to track your credit score on a monthly basis. Offer available to qualifying customers only who have not subscribed to Spectrum TV services within the previous 30 days and have no outstanding obligations to Charter,. High rates make a typical debt consolidation loan a bad option if you have a credit score below 650.. my usaa account was hacked into and now usaa has cancelled my credit cards and locked my account for security reasons. Moreover, the constant rejection can be humiliating and degrading for subprime borrowers What are Bad Credit Loans? Student credit cards give young cardholders the opportunity to build credit. There are multiple options for debt consolidation (more on this in a bit), but if you stick to a well-thought-out. Quicken Loans is the largest online retail mortgage lender, according to National Mortgage News Having a default on your credit report is serious and will make it much harder for you to get a loan or buy things on credit for 5 years. Contrast a collateral loan with an unsecured loan, where all a lender can do is ding your credit or bring legal action against you. Buying with poor credit used to be difficult or even impossible, but things have changed thanks to the growing availability of Federal Housing Administration loans Buying a house with bad credit can be difficult, but it's possible with the help of the Federal Housing Administration and some proactive measures to improve creditworthiness. I just want to thank the people at Consolidated for helping me get through my credit credit in bank account means card debt. Your insurance rates (home, auto) are based largely on your scores. 3 years ago I opened a credit card with First Premier Bank in an attempt to rebuild my credit history. I am tentative to believe this. The American Express Platinum card has some of the best perks out there: cardholders enjoy the best domestic lounge access (Delta SkyClubs, Centurion Lounges, and Priority Pass), up to a $200 annual airline fee credit as well as up to $200 in Uber credits, and mid-tier elite status at SPG, Marriott, and Hilton American Express offers a card for every lifestyle. Apart from credit monitoring, clients can pull their credit reports from these companies and dispute bad items from them. Credit cards that have "secured credit" require a deposit and certain fees as security against any credit that the card is used for. Getting a new car loan has two predictable effects on your credit: It adds a hard inquiry to your credit report, which might temporarily shave a few points off your score A hard credit in bank account means inquiry is what is used when someone applies for a credit card or loan. Credit-card debt can often become overwhelming. Home > Business Directory > Credit Repair Services – Advance Fee. You don't have to earn a perfect credit score of 850 to be considered successful or qualify for the lowest interest on loans. As a result, the best Visa cards are usually among the best credit cards overall (some cards are from WalletHub partners) Capital One Home Credit Cards Card offers with a cash or miles rewards bonus are available by clicking the "Apply Now" button on this page, and may not be available if you credit in bank account means navigate away from or close this page. If you completed a Chapter 13 repayment plan, it credit in bank account means may remain on the credit report for 7 years How long does a bankruptcy stay on your credit report? Just some thoughts on credit in bank account means various ideas of cards you can offer, but my most desired is the first one on the list. Call the Student Loan Relief Helpline now at: 1-888-906-3065. Now that you're paid up on all your bills, it's time to give your credit score a serious boost. This is a fee the merchant has chosen to add Learn about low, flat-rate merchant account fees credit in bank account means from PayPal. No fee balance transfer cards were once ubiquitous. Special financing for the military and people with bad. Can I apply for a business credit card by phone? Debt elimination is credit in bank account means the best option for debtors that dug themselves in a hole by accumulating too much unsecured debt If you want to avoid credit card debt, pay off your credit card balance every month. Businesses only have to repay what they actually use Bad Credit. College students credit in bank account means are a big target for credit card companies Student cards are special credit card products that are usually only available to students enrolled in college or university.
{ "redpajama_set_name": "RedPajamaC4" }
This week's historic visit to Israel by India's prime minister revived memories of my previous associations with Indian leaders and the Indian Jewish community in the 1980s. India at that time was still a leader of the Non-Aligned Movement, dependent on Arab oil and expatriate income from the Gulf states in addition to accommodating a population of over 140 million Muslims. I will never forget my unpleasant meeting with the late Prime Minister Indira Gandhi at her home in New Delhi on December 21, 1981. She bitterly claimed that American Jews had turned the U.S. government and media against her, maligning her because they opposed her policies toward Israel. The discussion became hostile and despite her claim to like Jews, she came close to becoming anti-Semitic. I reminded her—to no avail—that during her childhood in the United Kingdom, Anglo Jews such the late Harold Laski—a leading professor of political science at the London School of Economics—were among the most fervent supporters of Indian independence. That meeting left me deeply distressed and pessimistic about prospects for the future. India's policy during the Six-Day War and Yom Kippur War basically echoed the Soviet line on Israel. Mrs. Gandhi sought to strengthen Indian support for the Arab world and intensified her hostility against Israel. When her son Rajiv became prime minister following her assassination in 1984, he maintained the anti-Israel policies, and if anything, they were even intensified. But at the same time, India is one country that never had a record of anti-Semitism and, unlike Muslims and Christians, Hindus never saw themselves as triumphant over Judaism or as a proselytizing faith. Although the bulk of the Indian Jewish community made aliyah, they did so freely, and the remnant of the ancient Bene Israel, who claim ancestry back to the Lost Tribes of Israel, maintain their synagogues and community centers. For many years, I continued to advocate for a change in Indian policy toward Israel. Indian External Affairs Ministry officials listened to me courteously and then politely dismissed whatever was discussed. The collapse of the Soviet Union in the 1990s had global implications. In November 1991, at the request of Dr. Moshe Yegar of the Israeli Foreign Ministry, I sought a meeting with the newly elected Indian Prime Minister P. V. Narasimha Rao. Yegar had met him in July 1991 following the kidnapping of Israeli tourists in Kashmir but the meeting deteriorated into a diatribe against Israel on Palestinian rights. The timing for my meeting was problematic as Rao had only been elected a few months earlier, in June 1991. However, thanks to the combined intervention of Congressman Stephen Solarz, then head of the House Asian and Pacific Affairs Subcommittee, and then-Australian Foreign Minister Gareth Evans, my request for an audience was reluctantly granted. This meeting was the first in many years between an Indian prime minister and a global Jewish representative. It became clear very quickly that Rao was far more receptive than his predecessors. But it transpired that there were only minor changes and no substantive improvement to India's policies. While agreeing to expand the Israeli consulates in Kerala and Mumbai, the deputy foreign minister stressed that India would not even contemplate full diplomatic relations with Israel until substantial progress was achieved in the peace process with the Palestinians. In early 1992, again through the intervention of Evans and Solarz, Rao granted me another interview. This took place two weeks prior to a critical visit he was to make to the United States. The dialogue was extremely tense and Rao clearly sought to conclude the meeting. I took one of the greatest political gambles of my life and with restrained chutzpah, told Rao I was no longer conveying a formal message – neither from the World Jewish Congress nor the Israeli government – but spoke as a private citizen. I told him I was confident that if diplomatic relations were to be postponed prior to his arrival in the U.S., he would find himself treated like Saddam Hussein and an utter pariah. I will never forget the sudden silence my outburst provoked. The Australian ambassador, whom I had urged not to participate, knowing this could be an unpleasant meeting, sat there paralyzed. Rao, after a few moments, responded with a tirade against my impertinence. Although Rao kept his cool and responded courteously, I left the meeting shaken, believing that I had crossed a red line and would have to bear the consequences. To my astonishment and joy, some weeks later, just prior to Rao's departure for the United States, India announced full diplomatic relations with Israel. Yegar at the Israeli Foreign Ministry subsequently wrote that he felt my meeting had played a critical role in consolidating Rao's decision to upgrade its relationship with Israel to full ambassadorial level. I subsequently flew again to India, met Rao who had enjoyed a successful visit to the U.S., thanked him for his support and conveyed to him Prime Minister Yitzhak Shamir's appreciation for India's vote in the U.N. for the repeal of the Resolution 3379, which determined that "Zionism is a form of racism and racial discrimination". Now, a quarter of a century later, Israel can be proud of an excellent relationship with India – a country with a population of 1.3 billion and with one of the world's fastest expanding economies and which will inevitably become a superpower. Upon completion of military service many Israelis have enjoyed prolonged visits to India and built up people-to-people associations. We have developed a very powerful defense relationship and Israel and India have become major trading partners. Politically also, India is beginning to publicly demonstrate its affinity toward Israel. Nothing highlights this significance more than the historic first visit to Israel of an Indian prime minister, Narendra Modi, who proudly and openly declares his friendship and emphasizes the importance of our mutual ties. When critics and doomsday prophets remonstrate that Israel is facing political isolation, one need only look at the rapidly improving relations between Israel and nations in Africa and the Asia-Pacific region—first and foremost, India. Those of us who were involved in promoting relations between Israel and India in the 1980s and 1990s never dreamed how strong and important those ties would become in just a few decades.
{ "redpajama_set_name": "RedPajamaC4" }
9 Signs of Emotional Abuse, According to a Relationship Expert Dr. Jenn Mann Signs of Emotional Abuse Last month, FKA twigs filed a lawsuit against ex-boyfriend Shia LaBeouf citing many instances of physical, emotional, and mental abuse. Among the laundry list of claims was that he imposed rules about the number of times per day she was to kiss and touch him and threatened to crash the car he was driving unless she told him she loved him — instances of controlling and threatening behavior often used by emotional abusers. "He brought me so low, below myself, that the idea of leaving him and having to work myself back up just seemed impossible," she told the New York Times. Twigs added that in filing this lawsuit she hoped "to raise awareness on the tactics that abusers use to control you and take away your agency." And when it comes to emotional abuse, awareness is key. While physical abuse is something we are all aware of and can easily define, there are so many different forms of emotional abuse and so many gray areas that it's often difficult to put your finger on. RELATED: 10 Signs of a Toxic Relationship Typically though, emotional abuse involves the abuser demeaning, controlling, humiliating, isolating, and creating fear in their victim. You are more vulnerable to emotional abuse if you grew up in a home where you witnessed a parent being abusive or being abused, if you were abused in any way as a child, or grew up in a home with addiction, but it can happen to anyone. Here, 9 signs of emotional abuse in romantic relationships. 9 signs of an emotionally abusive partner 1. A partner who makes threats. Threatening to break up, divorce, withhold love, deny sex, or anything else along those lines creates fear and anxiety about the relationship. This is a form of manipulation. This includes veiled threats like "the last woman who did this with me is gone!". Threats can also make you feel pressured to do things that you don't feel comfortable doing or don't want to do in order to avoid the consequence. 2. A partner who uses degrading language. Name-calling, degrading language, or cursing at another person is abusive — period. While some of us curse more than others and certain instances are innocent (i.e. "I feel so shitty about this fight we are having"), cursing at a person ("you are an asshole"), is hitting below the belt. 3. A partner who tries to isolate you. I spent many years working for a rape and domestic violence hotline and early on in the training we learned that batters isolate their victims. Typically, they try to pull them away from their family, friends, and their support system. This leaves the victim more dependent on the abusive partner and makes it more difficult to leave. It is one thing for a partner who loves and cares about you to point out friends who are unhealthy or don't help you be the best version of you. It is another to have a partner who makes you feel guilty for or demands that you stop spending time with people who love you and treat you well. 4. A partner who mocks, taunts, makes fun of, or attempts to humiliate you. Name-calling, cruel sarcasm, harmful nicknames, or insults on your appearance serve to embarrass you and make you feel bad about yourself. Doing this in public is particularly degrading and embarrassing, but it should never be tolerated privately either. This type of rude and degrading behavior is insulting and prevent any possible productive conversations between partners. It also tends to derail any discussion that had taken place prior because it creates a new conflict in and of itself. 5. A partner who gaslights you. Gaslighting is a form of manipulation that undermines the recipient's reality and is meant to leave them insecure, unsure of themselves and questioning their sanity. This comes in many forms, including but not limited to denying facts, lying, and invalidating your reality, accusations of paranoia, and being told that things did not happen that actually took place. RELATED: 15 Signs Your Partner Is Gaslighting You, According to a Relationship Expert 6. A partner who is constantly critical and cruel. These criticisms can be subtle or overt but serve to put you down and erode your self-esteem. There is a difference between a partner who asked you not to leave your socks on the floor, which may feel like a criticism, and someone who performs a character assassination. The second, which involves putting down the core of who you are, hits a lot harder and is out of bounds. 7. A partner who stonewalls. Stonewalling, which is one of the greatest predictors of divorce, is when a person puts up a verbal and emotional wall and refuses to engage in any conversation. They forgo the usual "ah ha" or acknowledgment that someone is speaking to them and totally ice you out. This cold shoulder treatment makes it impossible to have a dialogue and work through problems. 8. A partner who controls you. A partner who constantly tells you what to wear, who to talk to, where are you are allowed to go, or someone who makes decisions or plans for you without consulting with you is highly controlling. This may also take the form of monitoring you, checking your phone, or showing up places you were going to be. There's a difference between a couple where there has been infidelity and both agree to a period of transparency in order to heal a breach of trust and someone who is just inherently jealous and controlling and insists on closely monitoring their partner. 9. A partner who yells or screams at you. This often goes along with cursing or name-calling, but a partner who has constant angry outbursts raises their voice, or shouts at you is abusive. If you feel that you're constantly walking on eggshells to avoid your partner exploding, you have a problem. You should never be in a relationship that makes you feel bad about yourself or causes you pain. If you aren't feeling good in the relationship and you're questioning if it is abusive, you need to listen to that. If you are struggling to see whether or not your relationships is a healthy relationship or an abusive one, you may need the help of a therapist or might benefit from calling a domestic violence hotline in order to get some support and clarity. In Hump Day, award-winning psychotherapist and TV host Dr. Jenn Mann answers your sex and relationship questions — unjudged and unfiltered. How Getting Dressed Up (Or Not) To Sit Home All Day Affects Your Mood Working at home during the COVID-19 pandemic? The choice to dress up or stay in your pajamas can affect your mental health in surprising ways. Experts Explain How to Help a Friend or Loved One Who's Having a Panic Attack If you have a friend or family member who experiences panic attacks, it's natural to feel overwhelmed and helpless if it happens in your presence. Like any other mental health condition, it's impossible to truly understand what a panic attack feels like unless you've experienced one yourself - but that doesn't mean you can't help your loved one through it. 14 Ways Experts Say You Can Build Stronger Relationships In 2021 It's going to take more than a few FaceTime and Zoom happy hours!From Women's Health This Two-Step Process Can Help You Fight COVID Stress and Boost Your Mood After a daunting year, and with more challenges ahead in 2021, upgrading your approach to emotions can be a drug-free mood booster. 'The Walking Dead' Fans Have So Many Emotions About Season 10's Return So much is happening. 😮 Racism Can Have Lifelong Implications on the Mental Health of BIPOC, According to Experts Systemic and institutional racism exists in all aspects of life and impacts Black, Indigenous, and people of color's access to housing, healthcare, job opportunities, food security, wealth, mental health, and overall well-being. The racial unrest in 2020 illuminated these issues for all of society to see, whether or not people were ready to reckon with the true history of a country stolen from Indigenous people and built on the backs of Black people.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Key Verse: "And have ye not read this scripture; The stone which the builders rejected is become the head of the corner" (Mark 12:10). Believers are daily engaged in the battle of their lives; a war of attrition declared by the devil who is desperate to halt the realisation of God's purpose in their lives. But God assured us of victory. However, the certainty of defeat is not a disincentive for the devil as it spurs him on to fight more fiercely, forcing lukewarm believers to buckle under. Little wonder Jesus admonished us to "watch and pray". Our text is a parable. The vineyard in the parable is the nation of Israel, and the owner of the vineyard is the almighty God Himself. He painstakingly cultivated Israel as the source of salvation to the whole world. But they and their leaders, the husbandmen, frustrated His plans. When He observed their unfaithfulness, He sent His servants – the prophets and priests – to warn them. Rather than amend their ways, they routinely maltreated these servants. Eventually, God sent His Son, Jesus Christ, believing that they would show more respect and honour Him. But they conspired and killed Him, on the futile belief that they would then takeover the vineyard. God was left with no other option than to visit them with vengeance, striped them of their privilege and gave their place to the Gentiles. They rejected the Chief Cornerstone on which God laid the foundation of the redemption of man. Today, some think they can seize the keys of blessings of others and hinder their progress. They might even kill those whom God destined to spread the gospel. But as God's messenger, be comforted that He has spoken well concerning you. Only let Jesus be the Cornerstone of your life. Thought For The Day: A house set on a hill cannot be hidden.
{ "redpajama_set_name": "RedPajamaC4" }
UK Hair Council meet Prime Minister Apr 222015 Gossip As part of their ongoing campaign for mandatory state registration, the Hair Council were honoured to visit 10 Downing Street and meet with Prime Minister, Rt Hon. David Cameron MP, and his special adviser.This is the first time in 50 years that a Prime Minister has met with representatives from the Hair Council. Sally Styles, CEO and Registrar said: "The Prime Minister was extremely interested to hear about our work, and progress towards mandatory registration. He clearly has a great deal of respect and admiration for the hair industry and we were honoured to meet him." The delegation from the Hair Council included Shirley Davis-Fox MBE – Political Lobbyist and Political Ambassador Lino Carbosiero MBE, who is Mr Cameron's hairdresser. The delegation met with Daniel Korski, Special Adviser to David Cameron on Enterprise and Entrepreneurship. The Hair Council explained the logic behind state registration and outlined the significant achievements of the Council over the last year, which have included full costings and plans as to how registration will work in practice, and regular communications to members. Lynda Whitehorn SRH, Chair of the Hair Council said: "Over the last year, we have made significant strides in the drive towards state registration. Our meetings in Downing Street show just how far we have come. However, we know that there is a long journey ahead and we will continue to work hard to achieve the professional status that the UK's hairdressers deserve through mandatory state registration." La classifica dei TOP 100 HAIRSTYLISTS, i Migliori Parrucchieri d'Italia su STILEcapelli n.16 –
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Things changed radically in 2018 - website searches on mobile phones overtook desktop computer searches for the first time. This means that if your website is not mobile friendly throughout - you stand to lose ground in the SERPS - search engine results pages. These days it's unlikely that any web searchers will look beyond the first page/10 listings of organic search results. I'm happy to say that the vast majority of new sites that I build end up on the first page of search engine results. You pay nothing extra for this optimisation. SEO in recent times has become an industry in itself, often an ugly one, and like me I bet you get tons of spam offering you SEO deals. The prices can be enormous and frequently accompanied by large monthly fees to accommodate constant monitoring and adjustments. This kind of work is relevant to very large sites with huge competition - so if that's you - go ahead and sign up. However, you might be pleasantly surprised by my less expensive SEO formula. All my website builds come with design and coding for Google and Yahoo already in place - so you get off to a good start without paying a whacking great premium. SEO is not a quick fix - a new website or a recently optimised website will take weeks or even months to climb in the search results. Google and Yahoo need to trust your site. Thanks so much it all looks fantastic. I will definitely recommend you to everyone! I am 3rd on the list now and have 4 entries on 1st page. Have been busy registering on lots of local sites etc! Thanks. Caz, Greenhithe.
{ "redpajama_set_name": "RedPajamaC4" }
What were your pre-season expectations and have they been met? If I am honest I was hoping for mid table. So to finish fifth and get into Europe is fantastic. If you'd been on the touchline what would you have done differently to your manager this term? I don't think I would have done anything differently. Pardew does his job the way I like to see it done. Is there a player loved by your fans who other supporters may not rate particularly highly? If I am answering from a Sunderland fans point of view they are not too keen on Steven Taylor, who I really do rate. I will leave you to guess why the Sunderland fans aren't too crazy about him – the ones I have spoken to anyway. Thrashing Man Utd 3-0 at home. Probably the Carling Cup defeat at Blackburn when we came back from 2-0 down to lose the match. Who are your realistic transfer targets for this summer? Bardsley has enjoyed an outstanding season. I think Sunderland fans were hoping for top ten, but after the start they had I think they will be reasonably satisfied. Which one – Bruce or O'Neill? If I had been Steve Bruce I maybe would have given James McClean his chance earlier in the season. If I was Martin O'Neill – maybe look to find Ji Dong-Won's best position. David Vaughan – very disappointing this season. Maybe Sessagnon – for me as a Magpie he tends to drift in an out of games. Beating Man City at home. Another full back is needed and also a striker. Hands off Papiss Cisse and Ben Arfa though!! Rhys Williams points to a bright future at the Riverside. To be fair to Tony Mowbray he has had a lot of injuries to deal with – so has made the best of what he had available. I don't know if I would call anyone a flop but at some point I would think they have all underperformed at times. Probably August – dream start to the league campaign. Probably losing to Sunderland in FA Cup at the Riverside or losing home to Leeds. They need a prolific striker, someone like Jordan Rhodes from Hudderfield. "Put your trousers on, yer nicked" The Sweeney scores for Pool. I think Hartlepool fans will be reasonably happy with mid-table position. On the whole Neale Cooper has got it right- so I don't think I would differ too much. Probably Nobby Solano who just couldn't sustain his level during games. Probably the 5-0 drubbing by Wycombe at their place. They need a prolific striker and a defensive minded midfielder to give them a better balance.
{ "redpajama_set_name": "RedPajamaC4" }
Arc of Convergence: AQAP, Ansar al-Shari`a and the Struggle for Yemen June 2012, Volume 5, Issue 6 Christopher Swift Al-Qa'ida in the Arabian Peninsula The May 21, 2012, suicide attack on Yemeni soldiers parading in Sana`a's al-Sabin Square marked a turning point in Yemen's struggle against al-Qa`ida in the Arabian Peninsula (AQAP) and its subsidiary, Ansar al-Shari`a. Coming two weeks after Yemeni President Abd Rabbuh Mansur Hadi's pledge to purge terrorists from "every district, village, and place,"[1] the perpetrators cast the bombing as a retaliatory strike. "The primary target of this blessed operation was the defense minister of the Sana`a regime and his corrupt entourage," proclaimed Ansar al-Shari`a's Madad News Agency. "It came in response to the unjust war launched by the Sana`a regime's forces in cooperation with the American and Saudi forces."[2] The bombing also revealed more parochial motives. In addition to retaliation, Ansar al-Shari`a claimed to avenge "the demonstrators and all Muslims who tasted the scourge of the Yemeni central security forces" during the Arab Spring protests.[3] Recalling the violent crackdown on protestors in Sana`a and the alleged torture of Islamist activists, the communiqué justified the slaughter of Yemeni soldiers in populist terms while appealing to citizens who survived similar "massacres" at the hands of the previous regime. This reasoning minimized global jihad while emphasizing national struggle. Despite its Salafi-jihadi boilerplate, however, Ansar al-Shari`a appeared far more concerned with co-opting the "recent revolution" in Yemen than resisting the unholy U.S.-Saudi alliance. This emphasis on national struggle reflects a phase shift in al-Qa`ida's messaging and methods. As Barak Barfi and Ryan Evans have observed, AQAP eschews tribal domination in favor of more nuanced efforts to capture indigenous support.[4] Other studies reinforce this point, explaining how "strong norms of retribution, tribal coherence, and force of arms" limit its ability to "seize support through repression."[5] Despite being rooted in Yemen's culture, society, and tribal system, the movement maintains its rhetorical and operational focus on the far enemy—underscored by the recent attempt to bomb a passenger aircraft bound for the United States.[6] These parallel approaches could ultimately diverge, creating tensions between national objectives and international ambitions. For the moment, however, AQAP has proven remarkably adept at reconciling the ideological dictates of global jihad with the practical realities of local insurgency. This article examines that reconciliation in three stages. First, it explains how AQAP uses Ansar al-Shari`a to operate and propagate within Yemen's tribal society. Second, it discusses AQAP's current capabilities and structure, with particular emphasis on its operations in Abyan and Shabwa provinces. Third, it examines AQAP's efforts to knit Saudi ideologues, Yemeni tribesmen, and a diverse cohort of foreign fighters into an ideologically and operationally coherent coalition. Drawing on more than 40 interviews with religious, political, and tribal leaders from 14 of Yemen's 21 provinces conducted in May and June 2012, this analysis addresses the arc of convergence among these factions and the implications for regional counterterrorism operations. Tribal Equilibrium AQAP is, and still remains, a conglomerate. Conceived in a January 2009 merger between al-Qa`ida cells operating in Saudi Arabia and Yemen, its members brought different perspectives and experiences to their regional franchise. Some, like former Guantanamo detainees Said Ali al-Shihri and Mohamed Atiq Awayd al-Harbi, fled to Yemen following their repatriation and failed rehabilitation in Saudi Arabia.[7] Others, including Yemenis such as Nasir al-Wahayshi, served with Usama bin Ladin in Afghanistan before bringing the jihad back home.[8] Proven in war and hardened by prison, this cohort rejected the informal accommodation between their Arab Afghan predecessors and Yemen's security services and called for jihad against the Yemeni regime.[9] AQAP also drew lessons directly from other al-Qa`ida franchises. Like al-Qa`ida in Iraq (AQI), the movement established its own provisional Islamic state.[10] Like al-Qa`ida's central leadership, it courted religious and tribal leaders with longstanding grievances, encouraging conservative clerics like Abdul Majid al-Zindani to challenge the Yemeni regime[11] and prominent shaykhs like Tariq al-Fadhli to turn against it.[12] Despite these similarities, however, AQAP built its movement from the ground up rather than the top down. Anxious to avoid an indigenous uprising similar to the Sunni Awakening in Iraq, al-Wahayshi pursued a three-pronged strategy of engagement, empowerment, and dependency among Yemen's tribes. Much of this engagement now occurs through Ansar al-Shari`a, which was reportedly founded in 2009.[13] Operating under its own banner, the movement issues communiqués, operates media outlets, and generates propaganda aimed at Yemen's Sunni tribesmen.[14] In doing so, Ansar al-Shari`a has abandoned the elitist, quasi-jurisprudential rhetoric espoused by al-Qa`ida purists in favor of a more populist (and often parochial) message.[15] As senior AQAP official Abu Zubayr Adel al-Abab observed, "the name Ansar al-Shari`a is what we use to introduce ourselves in areas where we work, to tell people about our work and goals, and [to show] that we are on the path of Allah."[16] Tribal leaders confirm this subsidiary relationship. Despite its unique brand, AQAP uses Ansar al-Shari`a to promote its activities in tribal areas, legitimize its members as "supporters" of Islamic law, and elicit popular support without implicating the controversial al-Qa`ida brand.[17] Combined with its direct appeals to demonstrators and Arab youth, this approach suggests an attempt to shelter AQAP's hard core within a broader, organically derived popular front. As Ansar al-Shari`a leader Jalal Muhsin Balidi al-Murqoshi explained, "We want to implement the Shari`a of Allah in [Abyan] and redress injustices…our goal is to circulate the Islamic model like the Taliban who did justice and provided security [in Afghanistan]."[18] Empowerment, in turn, comes in the form of economic inducement and public works. Individual recruiting is the primary vehicle. According to tribal leaders from al-Jawf, Lahij, and Marib, Ansar al-Shari`a targets Yemeni youth with the promise of a new rifle, a new car, and salaries as high as $400 per month.[19] The organization reportedly derives these revenues by raiding public institutions, including banks, police garrisons, and government offices.[20] Other sources include tolls charged at checkpoints for "policing" the roads[21] and, to a lesser extent, donations routed through Islamic charities in Saudi Arabia.[22] Whatever the source of these funds, salaries incentivize recruiting in tangible, sometimes irresistible ways. For unemployed teenagers with little education and even less status, joining the insurgency offers the material and financial trappings of manhood.[23] For underemployed adults, an Ansar al-Shari`a salary provides a means of lifting their families out of poverty. With nearly half of Yemen's population surviving on less than two dollars per day,[24] al-Qa`ida's compensation offers a level of security and sustenance that many tribal leaders cannot provide.[25] Empowerment also operates at the village or district level. In communities plagued by chronic drought or hunger, tribal elders have reportedly recruited fighters for Ansar al-Shari`a in exchange for new wells, new irrigation systems and even food.[26] Current international humanitarian assistance programs do little to disrupt this cycle, with most of the direct aid consumed by refugees in Aden displaced by the fighting in nearby Abyan and Lahij provinces.[27] Bilateral development assistance programs are similarly problematic. According to one European diplomat, foreigners kidnapped by tribesmen in contested regions like Marib and al-Jawf are now less likely to be ransomed to their governments in the traditional manner and much more likely to be sold to AQAP.[28] This shift underscores the extent of local desperation and jihadist infiltration in Yemen's rural areas. Yet it also illustrates the influence AQAP exercises through networks of mutual dependency. By conditioning the provision of salaries, public services, and other benefits on loyalty, the syndicate discourages its partners from pursuing alternative sources of patronage.[29] A similar calculus operates among some tribal leaders. By identifying and empowering weak shaykhs in isolated communities, AQAP is able to operate through certain tribal structures without resorting to overt coercion.[30] Instead, the potential loss of status, resources, and influence cements alliances and deters defectors, allowing AQAP to manage tribal equities in a manner that serves its evolving needs.[31] Ironically, foreign efforts to bolster tribal leaders aggravate rather than mitigate this problem. Supported by generous stipends from Saudi Arabia and enriched by their commercial ties to the Gulf States, tribal confederation leaders and paramount shaykhs are increasingly abandoning their local base for greater proximity to the seat of power in Sana`a.[32] This migration fosters isolation and fragmentation in some districts, effectively removing shaykhs from their traditional role as local benefactors, mediators and, when necessary, military leaders.[33] It also creates resentment, sidelining lesser shaykhs while forcing them to contend with levels of drought, poverty, and population growth that often exceed their own limited resources.[34] Faced with these conditions, accommodating or even allying with AQAP can become the best of several poor options.[35] Territorial Control In addition to establishing networks of dependency, AQAP also sets the tribes against themselves. As noted above, efforts to recruit individuals and empower marginal shaykhs circumvent traditional hierarchies, creating alternative sources of power and patronage.[36] Yet at the same time, AQAP actively exploits the prospect of inter-tribal conflict. By deploying members of one tribe into the territory of another, AQAP guarantees that any action against its own forces will be met with retaliation from its ranks and the victims' own tribesmen.[37] For example, according to one source, nearly 70% of the Ansar al-Shari`a recruits currently fighting in Abyan Province come from central and northern regions like al-Jawf and Marib, and thus have no tribal ties to the region where they currently operate.[38] Similar patterns are also evident in northern Yemen's Sa`da Province, where sources report an influx of young outsiders in the increasingly frequent skirmishes between AQAP and the Zaydi Huthi rebels.[39] These deployments across provincial and kinship boundaries upset the natural equilibrium among Yemen's tribes. Fearful of provoking their stronger neighbors, weaker shaykhs become less likely to challenge AQAP's presence in their traditional sphere of influence.[40] As a result, many are shifting the burden of securing remote regions to Yemen's fractious transitional government.[41] The deployments may also increase compliance and unit cohesion. By isolating new recruits from their traditional social and kinship structures, AQAP is enforcing its ideological and operational control.[42] This forbearance allows AQAP to find sanctuaries, build training camps, and establish de facto territorial control.[43] Based from its mountain stronghold at Azzan in Shabwa Province, the movement now operates in at least 12 of Yemen's 21 provinces, including the capital.[44] In some places it even governs, using armed militias and Shari`a courts to prosecute criminals, protect private property, and establish a brutal yet predictable sense of order.[45] In doing so, the movement exhibits a pragmatic approach that has more in common with the Taliban's operations in Afghanistan than it does with Usama bin Ladin's globalized, deterritorialized jihad.[46] The seizure of Jaar in Abyan Province is a case in point. According to southern leaders, AQAP operated in Abyan's Khanfar district for nearly three years before mounting a coordinated operation.[47] Endemic poverty and the absence of strong tribal structures facilitated these operations, allowing them to develop a measure of sympathy and support within the local population.[48] In March 2011, militants seized the "7th of October" munitions factory near Jaar, carting off cases of ammunition and gunpowder.[49] Subsequent raids on military garrisons across Abyan Province yielded rockets, mortars, and other small arms, as well as Russian-made armored personnel carriers and T-55 tanks.[50] Working with these assets, the syndicate established two new training camps—one in a remote agricultural area approximately three miles outside Jaar, and a second in Shokrah, some 19 miles away.[51] According to eyewitness accounts, more than 50 senior AQAP fighters relocated from Azzan to this newly-styled "Emirate of Waqar" in the summer and autumn of 2011. The new stronghold was reportedly so secure that al-Wahayshi and other senior AQAP commanders would commute between Jaar and Azzan on a weekly basis.[52] The Battle of Zinjibar campaign reflected a similar pattern of resource extraction and territorial consolidation. Supplied from positions in Jaar, an initial force of 300 Ansar al-Shari`a fighters attacked Abyan's provincial capital on May 27, 2011, and seized effective control of the city the following day. As in Jaar and other locations, militants sacked abandoned military and police garrisons, seizing ammunition, heavy weapons, and other military hardware from the army's besieged 25th Mechanized Brigade.[53] They also looted the unguarded provincial bank, carting away billions of Yemeni rials to finance their operations across the country.[54] According to a recent interview with AQAP Commander Jalal al-Beledi, the organization's expenditures in Abyan alone ran nearly $300,000 each month.[55] The Zinjibar campaign demonstrated AQAP's ability to seize territory and establish effective control, even in the midst of a government counteroffensive. According to eyewitness reports from within the city, militants established a da`wa center to indoctrinate the local population and Shari`a courts to impose justice.[56] From the execution of alleged government collaborators to the public crucifixion of a man accused of homosexuality, AQAP's hierarchy augmented Ansar al-Shari`a's prior emphasis on tribal engagement and economic inducement with a campaign of institutionalized intimidation reminiscent of the Taliban regime.[57] During the spring 2012 Yemeni counteroffensive, however, AQAP withdrew many of its forces to Azzan and adopted more traditional guerrilla tactics[58]—measures designed to retain the propaganda value of their forward presence while preserving their forces in the face of intensified airstrikes and a coordinated assault by five army brigades.[59] Other AQAP operations suggest a strategy of territorial exclusion. One notable example is the January 2012 seizure of Radda in Bayda Province. Initially the offensive seemed more symbolic than strategic. After looting the bank, flying their flag from the local citadel, and tagging buildings with jihadist graffiti, the militants entered into negotiations with government-appointed mediators and withdrew their forces one week later. The political message was clear, however. With Radda located adjacent to a highway linking Sana`a with eight southern provinces, the operation signaled AQAP's capacity to isolate Yemen's transitional government from the contested southern and western regions where its writ remains weak.[60] Each of these operations underscores AQAP's home field advantage. Unlike Afghanistan, Pakistan, or other locations on Islam's geographic periphery, AQAP's fighters speak the local language, understand the local culture, and are grounded in the local society. Even the movement's Saudi members are integrating into Yemeni tribal structures, marrying the daughters of sympathetic tribesmen in a manner recalling the kinship bonds Bin Ladin forged with his Taliban hosts.[61] The importance of these relationships should not be overstated, however. Although some Western observers view marriage as an instrument for expanding and consolidating political influence,[62] Yemeni sources report that AQAP cadres marry primarily within their own ranks. To the extent that weddings represent a form of coalition-building, the coalitions in question are between the new generation of globalized jihadists, represented by al-Wahayshi and the late Anwar al-`Awlaqi, and Arab Afghan veterans like Tariq al-Fadhli.[63] Purists and Pragmatists The fact that men like al-Wahayshi and al-Fadhli would memorialize their alliance through marriage suggests diversity within AQAP and the desire to overcome political, generational, and other differences. Such differences do not diminish the unifying influence of Salafi-jihadi ideology, nor do they disrupt the operational hierarchy between AQAP and its Ansar al-Shari`a subsidiary. Yet they do indicate more nuanced and complex dynamics within the movement itself. Despite AQAP's efforts to present a unitary, undifferentiated front, four discernible elements still persist. The first element is comprised of ideological purists. Dominated by Saudi nationals, these militants tend to view jihad as an ethical rather than political struggle. As a result, they tend to embrace Bin Ladin's emphasis on provocative operations against high-value targets. The August 27, 2009, assassination attempt against Saudi Interior Minister Prince Muhammad bin Na'if is a case in point. Although the operation failed, bombmaker Ibrahim Hassan Tali al-Asiri's decision to recruit, train, and sacrifice his own brother demonstrated an unprecedented degree of ruthlessness and resolve.[64] More significantly, it demonstrated a desire to foment revolution through a public, self-negating act. Preoccupied by high rhetoric and high drama, the purists treat Yemen as a staging ground for educating the masses and reviving al-Qa`ida's global operations. The second element is composed of political pragmatists. Although no less virulent in ideology, its members seek concrete, incremental gains that expand their influence, undermine their adversaries, and consolidate their power. Where the purists revere Bin Ladin and emphasize global operations, the pragmatists model their campaign on the Taliban and seek deeper indigenous traction.[65] Latent nationalism may also inform their outlook. According to some local observers, Yemeni nationals who were either born or educated in Saudi Arabia dominate this faction. Although somewhat removed from the rigors of tribal life, they share the belief that Yemen is a prize to be won in its own right.[66] The third element encompasses Yemen's indigenous Salafists. Some, like al-Fadhli, are veterans of the Soviet-Afghan War with lingering personal and political grievances.[67] Others are allegedly holdovers from the 1994 Yemeni Civil War and, to a lesser extent, the now-defunct Aden Abyan Islamic Army (AAIA).[68] Their numbers also include younger Yemenis, including graduates of al-Zindani's Imam University outside Sana`a.[69] As one alumnus explained, there has long been an intense theological and political debate within Imam University between quietists who seek to restore the caliphate through education and dialogue, and activists compelled to create it by force.[70] Energized by the Arab Spring and radicalized by government crackdowns, students ascribing to the latter view have reportedly left the university for jihad in the south.[71] Among them are tribesmen from al-Zindani's village, al-Arhab, as well as individuals related to prominent Islamist leaders from cities such as Marib and Radda.[72] The fourth and most unpredictable element is comprised of foreign fighters. According to two independent eyewitness accounts, AQAP stationed between 500 and 600 militants in Jaar prior to its liberation by Yemeni Army forces.[73] Of that number, approximately 10% (or only 50 to 60 men) were foreign nationals. A slightly higher ratio was witnessed in Zinjibar, where foreigners represented between 10 and 20 of the approximately 60 guerrilla fighters remaining in the city near the end of May 2012.[74] In both instances, however, foreign nationals (including Saudis) appear to have represented less than a third of the AQAP or Ansar al-Shari`a forces operating in Abyan Province at any given time. The foreign fighters' origins are eclectic. Somalis are the largest contingent, reportedly representing at least half of the non-Yemeni jihadists observed by eyewitness sources.[75] Saudis are second, comprising nearly a quarter of AQAP's foreign contingent. The remaining cohort is a mélange. Some sources describe a contingent of Jordanian jihadists migrating from Iraq.[76] Others observed Afghans and Pakistanis, a Nigerian, and a "red faced man" believed to be of Russian or European origin.[77] Other militants from Western backgrounds reportedly included two Frenchmen of North African descent, and one English-speaking convert to Islam.[78] Much like the Saudi purists described above, these deterritorialized militants appear to be fighting for ethical rather than political ends. The Somali contingent is a case in point. Although some analysts posit a strategic alliance between AQAP and al-Shabab,[79] local sources report that Somali fighters in Yemen have generally abandoned the local struggle in Somalia in favor of a more globalized, deterritorialized jihad.[80] Stated differently, these jihadists see themselves as part of a global vanguard, rather than reinforcements from a sympathetic ally.[81] This orientation, however, makes them unsuitable for Ansar al-Shari`a front operations. Respected for their military experience, unit cohesion and ideological tenacity, AQAP reportedly uses its Somali fighters as shock troops, rather than as recruiters within Yemen's tribal population.[82] The distinctions among factions reveal a degree of dynamism within the wider movement. Although AQAP reportedly imposes a strict hierarchy on its followers—particularly in the ideological and operational domains—its members view their struggle and its objectives in different terms. Saudi purists and foreign fighters likely favor high profile assassination and provocation operations intended for global audiences. They see local gains as a basis for waging global jihad. Yemeni pragmatists and indigenous Salafists, by comparison, emphasize the sort of attritional operations and territorial consolidation aimed at establishing a self-sustaining insurrection. Their goal is to reestablish the caliphate, village by village, district by district. These strategies are not necessarily in conflict. To the contrary, provocative terror can serve the pragmatists' insurgency, particularly insofar as it disrupts or discredits the Yemeni regime. Moreover, insofar as operations such as the al-Sabin Square bombing achieve both symbolic and attritional objectives, it signals deeper convergence between these two tendencies. The question now is which tendency will prevail, particularly following the Yemeni Army's liberation of Jaar and Zinjibar on June 12, 2012.[83] To the extent that the purists predominate, Yemen will likely witness urban violence directed at government officials, foreign embassies, and other symbols of the nexus between Yemen's transitional government and the "infidel" West. If pragmatism prevails, however, then the insurgency could shift from the southern coastal provinces to rural highlands in a bid to preserve itself—and its influence—for years to come.[84] Dr. Christopher Swift is a fellow at the University of Virginia's Center for National Security Law and author of the forthcoming book, The Fighting Vanguard: Local Insurgencies in the Global Jihad. An attorney and political scientist, he holds a J.D. from Georgetown University and a Ph.D. from the University of Cambridge. [1] "Hadi: I Won't Allow Split in Army," Yemen Fox [Sana`a], May 6, 2012. [2] "Statement on the Sabin Square Bombing," Madad News Agency [Azzan], May 21, 2012. [4] Barak Barfi, "AQAP's Soft Power Strategy in Yemen," CTC Sentinel 3:11-12 (2010); Ryan Evans, "From Iraq to Yemen: Al-Qa`ida's Shifting Strategies," CTC Sentinel 3:10 (2010). [5] Gabriel Koehler-Derrick ed., A False Foundation: AQAP, Tribes, and Ungoverned Spaces in Yemen (West Point, NY: Combating Terrorism Center, 2011). [6] "Al-Qaeda Yemen Plane Bomb Plot Foiled by 'Insider,'" BBC News, May 8, 2012. [7] Abdullah al-Oraifij and Khaled al-Shalahi, "Al-Oufi, Al-Shihiri Betrayed Our Trust: Families, Friends," Saudi Gazette, January 28, 2009. [8] Sudarsan Raghavan, "Al-Qaeda Group in Yemen Gaining Prominence," Washington Post, December 28, 2009. [9] Gregory D. Johnsen, "Testimony Before the Senate Foreign Relations Committee," U.S. Senate, January 20, 2010. [10] Aradar Madayah and Sawsan Abu-Husain, "Al-Qaeda Call for Islamic State in Southern Yemen," Asharq al-Awsat, May 14, 2009. [11] Personal interview, senior shaykh, Bakhil Tribal Confederation, Sana`a, Yemen, May 27, 2012. [12] Personal interview, senior provincial security official, Aden, Yemen, May 28, 2012. [13] "Interactive: Fractured Yemen," al-Jazira, June 5, 2012. [14] Personal interview, tribal mediator from Marib Province, Yemen, May 30, 2012, June 1, 2012; personal interview, tribal leader from al-Jawf Province, Yemen, June 1, 2012. [15] Personal interview, resident director, Yemeni non-governmental organization, Sana`a, Yemen, June 2, 2012. [16] "Online Question and Answer Session with Abu Zubayr Adel al-Abab, Shari`a Official for al-Qa`ida in the Arabian Peninsula, April 18, 2012," translation by Amany Soliman from the International Center for the Study of Radicalization and Political Violence. [17] Personal interview, independent Yemeni researcher, Sana`a, Yemen, May 27, 2012; personal interview, tribal leader from Ibb Province, Sana`a, Yemen, June 1, 2012; personal interview, Yemeni think-tank director, Sana`a, Yemen, June 2, 2012; personal interview, independent Yemeni journalist, Sana`a, Yemen, June 2, 2012. [18] Anis Mansour, "Interview with Jalal Muhsin Balidi al-Murqoshi," Hayat Aden News Agency, January 21, 2012. [19] Personal interview, tribal leader from al-Jawf Province, Sana`a, Yemen, May 30, 2012; personal interview, tribal mediator from Marib Province, Sana`a, Yemen, May 30, 2012; personal interview, tribal leader from Lahij Province, Sana`a, Yemen, June 1, 2012. Sources from Abyan, Hadramawt, and Shabwa provinces also gave similar accounts of Ansar al-Shari`a's local recruiting techniques. [20] Personal interview, independent Yemeni journalist, Aden, Yemen, May 29, 2012. [21] Personal interview, tribal mediator from Marib Province, Sana`a, Yemen, May 30, 2012. [22] Personal interview, former senior People's Democratic Republic of Yemen leader, Aden, Yemen, May 28, 2012; personal interview, Yemeni think-tank director, Sana`a, Yemen, June 2, 2012. [23] Personal interview, tribal leader from Dhamar Province, Sana`a, Yemen, May 30, 2012. [24] "Yemen Country Brief," World Bank, April 2012. [25] Personal interview, tribal leader from Abyan Province, Aden, Yemen, May 28, 2012. [26] Personal interview, tribal mediator from Marib Province, Sana`a, Yemen, May 30, 2012; personal interview, Popular Committee commander from Abyan Province, Sana`a, Yemen, May 31, 2012. [27] Personal interview, Danish Refugee Council official, Sana`a, Yemen, May 31, 2012. [28] Personal interview, German Embassy official, Sana`a, Yemen, May 26, 2012. [29] Personal interview, tribal leader from Lahij Province, Sana`a, Yemen, June 1, 2012. [30] Personal interview, tribal leader from al-Hudaydah Province, Sana`a, Yemen, May 31, 2012. [31] Personal interview, independent Yemeni researcher, Sana`a, Yemen, June 2, 2012. [34] Personal interview, tribal leader from al-Hudaydah Province, Sana`a, Yemen, May 27, 2012; personal interview, tribal leader from Shabwa Province, Aden, Yemen, May 28, 2012; personal interview, Popular Committee commander from Abyan Province, Sana`a, Yemen, May 31, 2012. [35] Personal interview, al-Islah Party official from Hadramawt Province, Aden, Yemen, May 28, 2012. [36] Personal interview, tribal leader from al-Hudaydah Province, Sana`a, Yemen, May 31, 2012; personal interview, Yemeni think-tank director, Sana`a, Yemen, June 2, 2012. [38]Personal interview, Salafist cleric from Lahij Province, Sana`a, Yemen, June 2, 2012. [39] Personal interview, senior Hizb al-Haq Party official, Sana`a, Yemen, June 27, 2012. [41] Personal interview, senior provincial security official, Aden, Yemen, May 28, 2012; personal interview, Popular Committee commander from Abyan Province, Sana`a, Yemen, May 31, 2012. [43] Personal interview, Yemeni think-tank director, Sana`a, Yemen, June 2, 2012. [44] "Yemeni Troops Target al-Qaeda," al-Jazira, January 5, 2010. [46] For more on this imitation and idealization of the Taliban regime, see Yemeni journalist Abd Illah Haydar Sha`a's interview of Nasir al-Wahayshi, available at www.abdulela.maktoobblog.com. [47] Personal interview, senior Yemen Sons League Party official, Aden, Yemen, May 28, 2012. [49] "Abyan Explosion Kills Scores," National Yemen, March 28, 2011. [52] Personal interview, Salafist cleric from Lahij Province, Sana`a, Yemen, June 2, 2012. [54] Personal interview, independent Yemeni researcher, Sana`a, Yemen, May 27, 2012; personal interview, independent Yemeni researcher, Sana`a, Yemen, May 31, 2012. [55] Nasser Arrabyee, "Al-Qaeda Threatens to Fight More Effectively from Caves and Mountains," June 14, 2012, available at www.narrabyee-e.blogspot.com. [56] Ghaith Abdul-Ahad, "Al-Qaida's Wretched Utopia and the Battle for Hearts and Minds," Guardian, April 30, 2012. [59] Personal interview, former senior People's Democratic Republic of Yemen official, Aden, Yemen, May 28, 2012. [60] Ahmed al-Haj, "Al-Qaeda in Yemen Captures Town South of Capital," Associated Press, January 16, 2012. [62] "Al-Qaeda in Yemen and Somalia: A Ticking Time Bomb," U.S. Senate Foreign Relations Committee, January 21, 2010. [64] "Prince Mohammed Escapes Assassination Attempt," Arab News, August 28, 2009. [66] Christopher Swift, "From Periphery to Core: Foreign Fighters and the Evolution of Al-Qaeda in the Arabian Peninsula," in The Foreign Fighter Problem: Recent Trends and Case Studies (Philadelphia, PA: Foreign Policy Research Institute, 2011). [67] Personal interview, Yemeni political analyst and opposition activist, Sana`a, Yemen, May 27, 2012; personal interview, Yemen researcher and al-Islah Party activist, Sana`a, Yemen, May 31, 2012. [68] Personal interview, senior Yemeni Socialist Party official, Aden, Yemen, May 28, 2012. [69] Personal interview, independent Yemeni youth leader, Sana`a, Yemen, May 31, 2012. [72] Personal interview, independent Yemeni political analyst, Sana`a, Yemen, June 1, 2012. [73] Personal interview, independent Yemeni journalist, Aden, Yemen, May 29, 2012; personal interview, Salafist cleric from Lahij Province, Sana`a, Yemen, June 2, 2012. [76] Personal interview, independent Italian journalist, Rome, Italy, May 22, 2012; personal interview, tribal leader from Abyan Province, Aden, Yemen, May 28, 2012; personal interview, Popular Committee commander from Abyan Province, Sana`a, Yemen, May 31, 2012. [79] Zarif Maseh, "Terror Partnership: AQAP and Shaba'ab," Critical Threats, July 2, 2011. [80] Personal interview, independent Yemeni journalist, Aden, Yemen, May 29, 2012; personal interview, Yemeni think-tank director, Sana`a, Yemen, June 2, 2012. [83] "Army Take Zinjibar, Jaar, the Last Key Stronghold of Militants in South Yemen," Yemen Post, June 12, 2012. [84] Arrabyee.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
The Shahroud Eye Cohort Study was set up to determine the prevalence and incidence of visual impairment and major eye conditions in the 40-64-year-old population of Shahroud as a Middle Eastern population. The first phase of the study was conducted in 2009-10. Using random cluster sampling, 6311 Shahroud inhabitants were invited for ophthalmologic examinations; of these, 5190 participants completed phase 1 (participation rate of 82.2%). All participants were interviewed to collect data on participants' demographics, occupation status, socioeconomic status, history of smoking, and medical and ophthalmic history, as well as history of medication, and the quality and duration of their insurance. DNA and plasma samples, as well as four dots of whole blood were collected from participants. Extensive optometric and ophthalmologic examinations were performed for each participant, including lensometry of current glasses, testing near and far visual acuity; determining objective and subjective refraction; eye motility; cycloplegic refraction; colour vision test; slit-lamp biomicroscopy and intraocular pressure measurement; direct and indirect fundoscopy; perimetry test; ocular biometry; corneal topography; lens and fundus photography; and the Schirmer's (1008 participants) and tear breakup time tests (1013 participants). The study data are available for collaborative research at Noor Ophthalmology Research Center, Tehran, Iran.
{ "redpajama_set_name": "RedPajamaC4" }
\section{Introduction} The \gls{vc} task consists of modifying a speech signal uttered by some source speaker as another target speaker uttered it. Cross-lingual \gls{vc} allows using different source and target languages. In such a task, the linguistic information is preserved, but speaker-dependent features are changed, which requires semantic reasoning about the input signal. \Gls{vc} is an inherently ill-posed problem; there are multiple correct outputs. Even if it is easy for humans to identify the concepts of content and style (assessed as naturalness and speaker similarity), it is difficult to quantify the conversion's overall speech quality. On the one hand, the lack of objective measures hinders choosing a training strategy and an objective function. On the other hand, most of the works in \gls{vc} only report subjective scores. Some works on parallel \gls{vc} report objective metrics such as the Root Mean Square Error (RMSE) \cite{rmse}, but those are not always correlated with human perception \cite{sisman2020overview}. This is especially the case for non-parallel scenarios, where even \gls{pesq}, which predicts the human-perceived speech quality with respect to a target signal, does not correlate with subjective scores (see \cref{sec:objective}). The subjective score indicates how a system works and may be biased depending on the test setup. Moreover, it is impossible to compare available systems evaluated only by different evaluators' subjective tests and under different conditions. The \gls{vc} Challenge\footnote{\url{http://www.vc-challenge.org/}} circumvents this problem by providing a common evaluation dataset and performing large-scale crowd-sourced perceptual evaluations. \gls{vc} requires the factorization of speech into linguistic and non-linguistic information. Therefore, one natural approach is to use representations that lack speaker information, which are well studied in the speech recognition domain. Such representations are then concatenated with the information of the target speaker (studied in the speaker identification and verification domains) and mapped to the waveform domain yielding the \gls{vc} output. One example of such an approach achieving high-quality conversions consists of first transcribing audio to text using an \gls{asr} system and then using a \gls{tts} model conditioned on the target speaker and the obtained transcription \cite{hayashi2019espnettts, inaguma2020espnet, watanabe2018espnet}. Another common approach when dealing with non-parallel data is to train an \gls{ae} model in speech reconstruction and enforce speaker independence in the latent representations. Such latent features are then used in the same fashion as the speaker-independent representations of the former approach. This method can suppress the need for annotated data and find representations that potentially preserve para-linguistical information. In line with the \gls{vc} Challenge 2020, this work uses non-parallel data for the \gls{vc} model training. In particular, the proposed method is based on conditional \glspl{ae} as in AutoVC~\cite{autovc}, but with focus on fast conversions. \section{Related Works} The approaches using speaker-independent representations leverage pre-trained models for its computation. In general, these systems require large amounts of transcribed data, whose collection is very costly and time-consuming \cite{Pascual2019}. Moreover, such speaker-independent features usually lack para-linguistical information such as the intonation, which can potentially lead to conversions having different meanings in some cases. In the case of using text, the timing information is also lost, and an additional mapping to phonetic transcriptions is needed in cross-lingual settings. Speaker independence can be explicitly enforced with an adversarial setting, where a classifier is trained to predict the speaker from the latent representation. The loss from such classifiers can then be used to learn the mapping from the input signal to the latent space \cite{chou2018multitarget,starganvc}. One can also implicitly enforce speaker independence by reconstructing the speech from the low-dimensional latent representation and uncompressed speaker information. Speaker disentanglement, in this case, follows from the redundancy principle \cite{barlow-redundancy}. Since the waveform generator is explicitly conditioned on the speaker identity, the feature extractor does not have to capture speaker-dependent information in the latent features. The desired speaker independence is achieved if the dimension of the latent space satisfies the following trade-off. On the one hand, it has to be sufficiently small to factor out the speaker's information. On the other hand, it has to be large enough to allow for perfect reconstruction and capture as much of the input data as possible. AutoVC achieves a speaker-independent latent space by implementing the previous approach with a simple conditional \gls{ae}. The encoder network of the \gls{ae} applies an information bottleneck that both reduces the number of features and downsamples the signal in the temporal dimension. CycleVAE \cite{cyclevae} models the information bottleneck with a \gls{vae}, which means that the latent features are enforced to follow a known distribution. \gls{vq}-\gls{vae} \cite{vq-vae} uses \gls{vq} as an additional information bottleneck on the latent features obtained with a \gls{vae}. Time-jitter regularization, consisting of replacing each latent vector with either one or both of its neighbors, was also shown to be useful as an additional information bottleneck in top of the former approach~\cite{unsupervised-representation}. This regularization helps to model the slowly-changing phonetic content by avoiding the use of latent vectors as individual units. The authors claimed that the latent representations found by \glspl{ae} do not factor the speaker out. Instead, their findings showed that a \gls{vae} or its \gls{vq} version was required to achieve speaker disentanglement. However, \cite{spk-encoder} showed that conditional \glspl{ae} with speaker-dependent encoders effectively achieve the desired speaker-independent latent representations. \section{FastVC} FastVC is an end-to-end model that performs fast many-to-many \gls{vc} and is trained using non-parallel data. This system performs \gls{vc} by learning a mapping between the source and converted waveforms. This latter has the same linguistic information as the source speech but different speaker information. In particular, FastVC learns this mapping with a conditional \gls{ae} framework that is trained on the reconstruction of Mel-spectrograms similarly to \cite{autovc}. FastVC performs \gls{vc} with the three-stage model depicted in \cref{fig:fastvc}. Its \gls{ae} module is depicted in \cref{fig:fastvc_autoencoder}. \begin{figure*}[ht] \centering \includegraphics[width=.9\textwidth]{img/fastvc.pdf} \caption[FastVC model architecture.]{FastVC model architecture during conversion mode. During training, both the the source and target speaker identities are the same.} \label{fig:fastvc} \end{figure*} \begin{figure*}[ht] \centering \includegraphics[width=.8\textwidth]{img/fastvc_autoencoder.pdf} \caption[AutoEncoder module of FastVC.]{Diagram of the \gls{ae} module for FastVC during conversion mode. The \texttt{AutoEncoder} comprises the \texttt{Encoder} and the \texttt{Decoder}, but also the \texttt{PostNet}. The \texttt{PostNet}, which is proposed in \cite{autovc}, builds the finer details of the spectrogram, which is excessively smooth before this module.} \label{fig:fastvc_autoencoder} \end{figure*} Equally to AutoVC~\cite{autovc}, FastVC uses log-scale Mel-spectrograms with 80 Mel channels as inputs. However, the Mel-spectrogram module is a~\gls{cnn}-based learnable module and not a fixed transformation as in AutoVC. This module can be trained if desired and is initialized to provide exact Mel-spectrograms. This allows using raw speech waveforms as input instead of Mel-spectrograms. The theoretical guarantees justifying the \gls{vc} capabilities of \cite{autovc} hold under the assumption that the speaker embeddings of different utterances of the same speaker are the same, and those from different speakers are distinct. In order to satisfy this assumption, FastVC uses one-hot encoded speaker embeddings similarly to \cite{vq-vae}. In FastVC, both the encoder $E(\cdot,\cdot)$ and the decoder $D(\cdot,\cdot)$ are conditioned on the speaker identity of the source and target speaker as in~\cite{spk-encoder}. This speaker identity is concatenated with the other input signal at every time step. One of the most key design choices in implementing a conversion function for \gls{vc} learned on speech reconstruction is choosing adequate information bottlenecks. FastVC uses dimensionality reduction in the frequency dimension and temporal downsampling as in \cite{autovc}. The latent features are then upsampled to match the original time rate using a causal variant of the nearest neighbor interpolation technique. This can be seen as a causal version of the time-jitter regularization proposed in \cite{unsupervised-representation}, with the time jitter as a hyper-parameter that corresponds to the downsampling factor. The information bottleneck introduces two pivotal hyperparameters for the speaker disentanglement; the latent features' dimension and the downsampling factor. In particular, FastVC doubles the temporal downsampling factor with respect to \cite{autovc}. This design choice achieves speaker-independent phoneme-like latent features that solve the pitch inconsistency problems of AutoVC reported in \cite{autovc2}. For more details on this, refer to \cite{barbany_msc}. FastVC generates speech with a sampling rate of 22050 Hz, which makes \gls{ar} models unsuitable, especially if fast conversions are desired. \cite{autovc} used WaveNet~\cite{wavenet} conditioned on the log-scaled Mel-spectrogram as a generative model for raw speech. To achieve fast inference, FastVC resorts to using a non-\gls{ar} generative model. This design choice is the main reason for the fast conversions obtained with this approach. In particular, the Mel-spectrogram inverter is chosen to be MelGAN, introduced by \cite{melgan}. \section{Experimental setup} \subsection{Datasets} FastVC only trains on raw speech waveforms and speaker identities. This means that it does not requires any additional annotation. The main dataset used for this project is the \gls{vctk} described in \cite{vctk}. The \gls{vctk} dataset is chosen as the main dataset for its widespread use for the \gls{vc} task \cite{vq-vae,chou2018multitarget,autovc,autovc2}. The model comparison of the \gls{vc} Challenge is performed with samples generated using the dataset of the same Challenge. The use of the Challenge training dataset is essential but not enough to train a model such as FastVC. In this project, the \gls{vctk} and \gls{vc} Challenge datasets were simply merged, which is allowed in the Challenge. The TIMIT dataset \cite{timit} is chosen for the latent features' analysis (see \cref{sec:latents}). This dataset is public and contains speech data and hand-verified time-aligned phoneme transcriptions. In particular, only the test partition of this dataset is used to avoid incorporating many new speakers. \subsection{Training} \glspl{gan} are notoriously difficult to train, with mode collapse and oscillations being a common problem \cite{liang2018generative}. For this reason, the basic FastVC model (denoted FastVC in \cref{tab:pesq}) uses the pre-trained weights for MelGAN provided by \cite{melgan}. The \gls{ae} module in FastVC is trained from scratch to match the conditioning signal required by the Mel-spectrogram inverter. The basic version of FastVC is obtained by only training the \gls{ae} module using the ADAM optimizer \cite{adam} with a learning rate of 0.001, $\beta_1=0.9$, and $\beta_2=0.99$ for 200 epochs. The training objective for this setting is presented in \eqref{eq:basic_loss}, where $\mX$ is the input Mel-spectrogram, $\ss$ its correspondent speaker and $\hat{\mX}$ the \gls{ae} output. \begin{align} \cL_{content} = \norm{E(\mX,\ss) - E(\widehat{\mX},\ss)}^2 \label{eq:content} \end{align} \begin{align} \min \E_{\mX,\ss}\big[&\norm{\mX-\widehat{\mX}}^2 + \norm{\mX-D(E(\mX,\ss),\ss)}^2 +\cL_{content} \big] \label{eq:basic_loss} \end{align} \emph{FastVC with end-to-end training}: to allow the model to use information that may be not included in the Mel-spectrogram and generate more efficient representations for the task of \gls{vc}, FastVC also allows end-to-end training. The weights obtained in the only-\gls{ae} training are used as a starting point. In this setup, FastVC behaves as the generator of a \gls{gan}, which takes raw speech as input. FastVC uses multiple discriminators that run at different rates, as proposed in \cite{melgan}. To ensure that the linguistic information is captured, the content loss term \eqref{eq:content} is added to the generator objective in \cite{melgan}. The content loss term enforces the codes of the original and converted speech to be the same, i.e., it enforces \gls{vc} to be idempotent. We speculate that this is enough to achieve quality speech that preserves the lexical content. The content loss is weighted by a factor of $20$ and added to the generator's total objective. The regularization amount is chosen to ensure that the losses have the same order of magnitude, and they both decrease individually. For this setting, ADAM is also used as the optimization algorithm. In this case, however, with a learning rate of $10^{-4}$, $\beta_1=0.5$, and $\beta_2=0.9$ for 200 epochs. These specific values are suggested in \cite{gan_training} to train \glspl{gan} with ADAM, and also used in \cite{melgan}. All the experiments use a batch size of 16, and the merged dataset is randomly split into 90\% for training and 10\% for testing purposes. During training, FastVC is fed chunks of 8192 samples of speech sampled at 22050 Hz, while in inference, the model's input is the whole waveform. \section{Results} FastVC converts voices $4\times$ faster than real-time, and $500\times$ faster than AutoVC, measured on Intel(R) Core(TM) i7-8700K at 3.70GHz. \subsection{Objective assessment} \label{sec:objective} One of the main difficulties in building \gls{vc} models is that there are no standardized objective measures. The lack of such metrics hinders the system comparison and the performance of ablation studies. The variant of FastVC submitted to the \gls{vc} Challenge was chosen based on the value given by \gls{pesq}, an objective method that rates the speech quality by predicting the \gls{mos}. The fact that \gls{pesq} is not used as a standardized measure to substitute \gls{mos} is that the former requires both the desired waveform and the one generated with the evaluated system. The approach that FastVC takes to deal with non-parallel data is to learn the conversion function on the task of speech reconstruction. In this case, the \gls{pesq} measure is more suited since self-reconstruction was learned during training, and mapping to the same speaker is a valid \gls{vc} instance. \cref{tab:pesq} shows the obtained results. Note that the reconstruction performance alone is not a useful metric to evaluate a \gls{vc} system because it does not measure the speaker's disentanglement. In particular, perfect reconstruction can be achieved if there is no information bottleneck and thus the latent features are not speaker-independent. Therefore, this metric should be used for systems with speaker-independent inputs. \begin{table}[t] \centering \begin{tabular}{p{5.4cm}p{1.6cm}} \toprule Experiment & PESQ\\ \midrule AutoVC -- baseline \cite{autovc} & $\mathbf{2.56 \pm 0.23}$ \\ \midrule FastVC with information bottleneck proposed in~\cite{autovc} & $2.57 \pm 0.25$\\ FastVC with 10 Hz latent features & $2.61 \pm 0.24$\\ FastVC with adversarial speaker classifier & $2.62 \pm 0.24$\\ FastVC (VCC20 submission) & $\mathbf{2.68 \pm 0.22}$\\ \midrule FastVC with end-to-end training & $1.56 \pm 0.29$ \\ FastVC with learnable Mel-spectrogram & $1.50 \pm 0.40$ \\ PhonetVC (\cref{sec:phonetvc}) & $\mathbf{1.67 \pm 0.30}$\\ \bottomrule \end{tabular} \caption{Objective results performed over 100 utterances of less than 5 seconds from the test partition. The reported values are the mean and the standard deviation of the sample. First three FastVC variants are described later in \cref{sec:latents}.} \label{tab:pesq} \vspace{-2em} \end{table} FastVC with end-to-end training performs worse in terms of \gls{pesq} than FastVC. This can be justified because, in the end-to-end training, the aim is not to match the input Mel-spectrogram but to maximize the \gls{gan} objective. A future subjective evaluation would be needed to confirm if the \gls{pesq} also correlates with the perceived quality in such cases. The use of this metric with parallel utterances aligned using \gls{dtw} was also explored. However, in this case, the results were inconclusive and not related at all with perceptual scores. The ill-posedness of the problem can justify this; a sound output other than the time-aligned parallel utterance (or the input utterance in the evaluation of reconstruction, especially on the end-to-end case) may be obtained. \subsection{Subjective assessment} The subjective scores for the cross-lingual \gls{vc} task are presented in the \gls{vc} Challenge 2020 paper. FastVC is represented with the label \textbf{T15}. You can also compare the \gls{vc} Challenge baselines, AutoVC, and the proposed FastVC at \url{https://barbany.github.io/fast-vc/}. \subsection{Latent space analysis} \label{sec:latents} \subsubsection{Speaker independence} Prosodic information leaks through the bottleneck of AutoVC, causing the target pitch to fluctuate unnaturally~\cite{autovc2}. To tackle this issue, the authors proposed in \cite{autovc} to remove the speaker identity from the latent representations and the prosodic information. The temporal downsampling factor proposed in \cite{autovc2} matches the design choice of FastVC. With this value, FastVC outputs do not have the unnatural pitch jumps of AutoVC without the need of disentangling the prosodic information from the latent features and introducing the synthetic target prosody. Refer to \cite{barbany_msc} for more details. FastVC requires that the latent features are speaker-independent, but this is not explicitly enforced. The fact that the encoder disentangles the speaker in an unsupervised fashion can be explained with the redundancy principle \cite{barlow-redundancy}. However, adversarial training of the latent representations as in \cite{chou2018multitarget} could further disentangle the speaker's information and downplay the information bottleneck's design choices. To confirm if the redundancy principle suffices, a variant of FastVC with an adversarial speaker classifier was implemented. In particular, an adaptation of the discriminator used to achieve class-independent latent representations in \cite{musictranslation} is implemented. The minimax game here is for the encoder to seek class-independent latent features and the classifier to classify them correctly. The classifier is trained with the cross-entropy loss on the speaker labels using the ADAM optimizer with a learning rate of 0.001, $\beta_1=0.9$, and $\beta_2=0.99$. The negative loss, termed as domain confusion loss in \cite{musictranslation}, is added as a regularizer to \eqref{eq:basic_loss} with a weighting of $0.1$ so that each individual objective had the same order of magnitude. Even if the classifier network was trained simultaneously as FastVC, the prediction accuracy was 0\% when the speaker-independence signal was used with the latent features and when it was not. These results were obtained with a model trained using the 278 speakers resulting from the mix of the \gls{vctk} corpus and the test partition of the TIMIT dataset. The speaker-independence results suggest that the redundancy principle is enough to achieve speaker-independence, which is in line with the results reported in \cite{autovc,autovc2}. \subsubsection{Phonetic similarity} Similarly to \cite{vq-vae,unsupervised-representation}, the latent features of FastVC lack speaker information and are potentially similar to phonemes. A perceptron is used to find a hypothetically simple correspondence between phonemes and the latent features. This model is trained using the latent representations extracted from the TIMIT test data with a trained FastVC network. The obtained latent features are randomly split into the train (70\%), validation (10\%), and test (20\%) sets The information bottleneck on the temporal dimension of FastVC yields a latent representation with a 2.5 Hz rate. This rate is a factor of 10 lower than the rate of the latent features in \cite{vq-vae}. The average phoneme rate is around 10 Hz \cite{inforate_speech,phon_rate}, which means that each latent vector at a given time represents more than one phoneme. For the classification task, each latent vector was assumed to represent the phoneme with a larger intersection in the temporal domain. The phoneme classifier was trained by minimizing the cross-entropy loss with \gls{sgd} and early stopping on the loss on the validation partition of the dataset containing the latent features from the TIMIT test data. This classifier correctly classified 42.45\% of the latent features. In contrast, a random classifier and a classifier always choosing the prior most likely phoneme on the train partition had an accuracy of 2.44\% and 9.43\%. These results suggest that there is indeed a correspondence between the latent features and phonemes. For comparison, \gls{vq}-\gls{vae} \cite{vq-vae} uses a 128-dimensional discrete space and obtains a classification accuracy of 49.3\%, while choosing the prior most likely phoneme gives a 7.2\%. A classification drop from the results in \cite{vq-vae} is expected due to the lower rate representation and the classifier's simplicity. Even if the latent representations' low rate suggested that a latent vector represents a combination of sounds rather than a single phoneme, the number of distinct units with groups of phonemes exponentially grows with the group size. This growth implies that there are more classes to predict, and some may not even be seen during training \subsection{PhonetVC} \label{sec:phonetvc} PhonetVC is a variant of the proposed model designed to confirm the benefits of using the latent features obtained by FastVC instead of speaker-independent speech features. PhonetVC uses an estimation of the \gls{pllr} features computed with Phonet~\cite{phonet} instead of the latent representations obtained by the encoder network in \cref{fig:fastvc_autoencoder}. The resulting model works with speech at 16 kHz, and the Decoder, Postnet, and Mel-spectrogram inverter are jointly trained from scratch using the MelGAN training objective \cite{melgan}. \section{Conclusions} This work proposed a fast and competitive \gls{vc} system. It is worse at capturing the speaker's style of speakers with little data in comparison to its quality performance (see subjective results in the \gls{vc} Challenge paper). This is justified by the fact that the training dataset is very imbalanced concerning the language, and the performance could be degraded for non-English speakers. One possible approach to tackle the language imbalance problem is to incorporate additional non-English speech datasets to balance the languages. However, the percentage of data per speaker on the \gls{vc} Challenge would be even smaller in this case. A different approach to tackle dataset imbalance is the multi-reader technique described in \cite{dvector}. \section{Acknowledgements} We thank Kaizhi Qian for providing the non open-sourced full code of AutoVC used as a starting point for this project. \balance \bibliographystyle{IEEEtran}
{ "redpajama_set_name": "RedPajamaArXiv" }
Daily News Nevada Italian Carabinieri station in Piacenza shut over torture claims 6 months ago Nevada News Advertise Here for only $299 mo. Unlimited cpc Adspace ID1 Image copyright Guardia di Finanza Image caption Four of the suspects were pictured in this handout from Italy's financial police corps A group of Carabinieri military police have been arrested and their police station closed after investigators uncovered a raft of alleged crimes taking place in the barracks. The Carabinieri in the northern city of Piacenza are suspected of drug-trafficking, blackmail and torture. The case has shocked prosecutors and residents in the northern Italian city. "We are untouchable," one of the suspects is alleged to have told a colleague on a police wiretap. Accounts of the team's exploits were front-page news in Italy on Thursday, and local prosecutor Grazia Pradella said "nothing that went on in that barracks was legal – they were out-and-out criminals". The allegations read like the pages of a crime novel, and many of the offences took place in the weeks when Italy went into pandemic lockdown, even though the police operation began in 2017. Image caption One picture showed a man who had clearly been mistreated in custody "While the city of Piacenza was counting so many coronavirus deaths, these Carabinieri supplied drugs to the drug dealers who were stuck at home without drugs under anti-Covid rules," the prosecutor said. Piacenza is in the northern region of Emilia Romagna and suffered one of the highest death rates in Italy. She compared what went on at the barracks to the practices of organised crime syndicates. Suspects who were brought in for questioning were mistreated and even tortured. One photo released to the media showed a detainee in handcuffs and bare feet with a bloody nose. According to one wiretap, one member of the corps was heard saying they would never be caught. "I've made a criminal gang, guys! In short, we've built a pyramid. We stand on top – me you and him – we're untouchable ok?" The prosecutor said Carabinieri in the Levante barracks were suspected of drug dealing, receiving stolen property, extortion, illegal arrest, embezzlement and abuse of office. While 12 people were under investigation, five people were detained and a sixth placed under house arrest. The military prosecutor in Verona, who has jurisdiction in the case, said he had opened an investigation and was working in close contact with his colleagues in the civil judiciary. The revelations risked tarnishing the image of 110,000 men and women who did their best every day to uphold the values of the military police force, Italy's defence minister said. However, reports also emerged of a young Carabiniere who refused to join in the beatings, drugs and other alleged illegal activities. The most recent arrival at the barracks, identified in Italian reports as having the initials RB, was recorded complaining to his father about what was going on. According to Italian media, his father told him to move to a department where he would feel more comfortable Media caption"We risked everything to survive" – Naples resident Filomena Advertise Here for only $299 mo. Unlimited cpc Adspace ID4 Tags: Europe, World Previous Tottenham triple shooting: Man critical, two boys hurt Next Germany's Ritter Sport wins square chocolate battle against Milka Donald Trump balloon: Baby blimp acquired by Museum of London Saudi Arabia executions: 'Drastic' reduction reported in 2020 Barry Shabaka Henley On Playing Uncle Tunde On Bob Hearts Abishola: 'I Find The Character Influences Me As Much As I Do Him' 20 hours ago Nevada News CARSON CITY WEATHER
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
name: Northgate Market address_1: 831 N Hacienda Blvd address_2: '' city: La Puente state: CA zip: '91744' phone: (626) 435-1440 latitude: '34.034285' longitude: '-117.950113' category: Supermarket website: 'http://www.northgatemarkets.com/' active: '' daycode1: Mon day1_open: '600' day1_close: '2200' daycode2: Tue day2_open: '600' day2_close: '2200' daycode3: Wed day3_open: '600' day3_close: '2200' daycode4: Thu day4_open: '600' day4_close: '2200' daycode5: Fri day5_open: '600' day5_close: '2200' daycode6: Sat day6_open: '600' day6_close: '2200' daycode7: Sun day7_open: '600' day7_close: '2200' title: 'Northgate Market, Food Oasis Los Angeles' uri: /supermarket/northgate-market-831-n-hacienda-blvd/ formatted_daycode1: Monday formatted_day1_open: 6am formatted_day1_close: 10pm formatted_daycode2: Tuesday formatted_day2_open: 6am formatted_day2_close: 10pm formatted_daycode3: Wednesday formatted_day3_open: 6am formatted_day3_close: 10pm formatted_daycode4: Thursday formatted_day4_open: 6am formatted_day4_close: 10pm formatted_daycode5: Friday formatted_day5_open: 6am formatted_day5_close: 10pm formatted_daycode6: Saturday formatted_day6_open: 6am formatted_day6_close: 10pm formatted_daycode7: Sunday formatted_day7_open: 6am formatted_day7_close: 10pm ---
{ "redpajama_set_name": "RedPajamaGithub" }
Have a website account?Log In orRegister for exclusive website content. About pcm Former Editorial Board Supplements and Series Submit Multimedia Files AME Editing Service Interviews with Outstanding Authors Online Review Journal Management (Editorial Roles) Research Ethics Policy Human and Animal Rights Authorship and Contributorship Informed Consent Policy Data and Reproducibility Policy of Screening for Plagiarism Process Policy of Dealing with Allegations of Research Misconduct Corrections and Retractions Special Series (Published) Special Series (Ongoing) PCM Chinese Edition Vol 5 (December 30, 2022) / Protocol: screening of genetic susceptibility genes for breast cancer patients and establishment of genetic high-risk... Protocol: screening of genetic susceptibility genes for breast cancer patients and establishment of genetic high-risk populations cohort in east china communities Zezhou Wang1,2, Sanjian Yu2,3, Xiaoshuang Feng1,2, Xia Qiu4, Hui Ji5, Hailin Shan6, Qing Shao6, Heng Xia7, Feng Cao8, Jun Li9, Cuixia Fu2,10, Liqin Chen2,10, Xiaofang Lu2,10, Tingting Su2,10, Qianqian Yu2,10, Shengqun Hou2,10, Honglian Wang11, Yun Liu12, Ying Zheng1,2, Zhimin Shao2,3, Zhen Hu2,3 1Department of Cancer Prevention, Fudan University Shanghai Cancer Center, Shanghai, China; 2Department of Oncology, Shanghai Medical College, Fudan University, Shanghai, China; 3Department of Breast Surgery, Fudan University Shanghai Cancer Center, Shanghai, China; 4Department of Breast Surgery, Zhoushan Hospital, Zhoushan, China; 5Department of General Surgery, Shanghai Tenth People's Hospital, Chongming Branch, Shanghai, China; 6Department of Thyroid and Breast Surgery, Jiangyin People's Hospital, Southeast University, Jiangyin, China; 7Department of Thyroid and Breast Surgery, Shaoxing Central Hospital, Shaoxing, China; 8Department of General Surgery, Shanghai Seventh People's Hospital, Shanghai University of Traditional Chinese Medicine, Shanghai, China; 9Department of General Surgery, Shanghai Pudong New Area Gongli Hospital, Shanghai, China; 10Department of Nursing, Fudan University Shanghai Cancer Center, Shanghai, China; 11AITA Biomedical Research Institute, Shanghai, China; 12Department of Biliary and Pancreatic Surgery, Renji Hospital, Shanghai Jiao Tong University School of Medicine, Shanghai, China Contributions: (I) Conception and design: S Yu, Y Zheng, Z Hu; (II) Administrative support: Z Shao; (III) Provision of study materials or patients: Z Shao, Y Zheng, Z Hu; (IV) Collection and assembly of data: X Qiu, H Ji, H Shan, Q Shao, H Xia, F Cao, J Li, C Fu, L Chen, X Lu, T Su, Q Yu, S Hou, H Wang, Y Liu; (V) Data analysis and interpretation: Z Wang, S Yu, X Feng; (VI) Manuscript writing: All authors; (VII) Final approval of manuscript: All authors. Correspondence to: Zhen Hu. Department of Breast Surgery, Fudan University Shanghai Cancer Center, 270 Dong-An Rd, Shanghai 200032, China. Email: [email protected]. Background: BRCA1 and BRCA2 genes have been proven to be genetic susceptibility genes for breast cancer. Their mutations are closely related to hereditary breast cancer, and can also increase the risk of other cancers. Several studies have been conducted to examine the distribution and prevalence of BRCA1 and BRCA2 mutations as well as the penetrance of breast cancer in BRCA1/2 mutation carriers among different populations. However, most studies conducted among Chinese were hospital-based research, whichmay not reflect the real epidemiology in the population. In order to fill the gaps in community research, this study aims to screen genetic susceptibility genes of breast cancer patients in the Chinese community and establish a cohort of genetic high-risk populations. Methods: This is a multisite, prospective, cohort study which has been ongoing in 3 provinces of eastern China since 2019. Up to 5,000 breast cancer survivors will conduct BRCA1, BRCA2, PTEN, CHEK2, and PALB2 genetic susceptibility genes testing, provide clinical and genetic information and family history. Participants were followed up based on the results. Discussion: This is the first study of breast cancer and other common malignancies penetrance and genetic susceptibility gene mutation carrying possibility which is based on community breast cancer data. It is superior to data from hospitals and high-risk clinics. The establishment of a mutation prediction model suitable for the Chinese population still has high socio-economic value. Trial Registration: This study is registered at ClinicalTrials.gov. (Registration number NCT04265937). Keywords: Breast cancer genetic susceptibility genes; community-based research; penetrance; prediction model Received: 18 July 2022; Accepted: 30 November 2022; Published: 30 December 2022. doi: 10.21037/pcm-22-36 According to the estimation by Global cancer statistics in 2020, female breast cancer has become the leading cause of global cancer incidence (1). Although China has a lower breast cancer burden compared with developed countries, the incidence and mortality of breast cancer in China has been increasing in the past decade (2). It has been reported that 5–10% of breast cancers have a hereditary background (3). Germline mutations in tumor-suppressor genes BRCA1 and BRCA2 are well known breast cancer predictors, which are involved in DNA repair and maintenance of genomic stability, and have been identified as genetic susceptibility genes of breast cancer (4). BRCA1/2 mutation carriers have a significantly increased risk of developing breast cancer and ovarian cancer during their lifetime. A meta-analysis pooled 22 studies worldwide shows that, the average cumulative risks in BRCA1-mutation carriers by age 70 years are 65% for breast cancer and 39% for ovarian cancer, the corresponding estimates for BRCA2 are 45% and 11%. Based on a prospective cohort of 9856 BRCA1/2 mutation carriers, BRCA1 and BRCA2 Cohort Consortium find that, the cumulative risk 20 years for contralateral breast cancer after breast cancer diagnosis is 40% for BRCA1 and 26% for BRCA2 carriers (5). And the cumulative breast cancer risk to age 80 years is 72% for BRCA1 and 69% for BRCA2 carriers. The cumulative ovarian cancer risk to age 80 years is 44% for BRCA1 and 17% for BRCA2 carriers. Furthermore, BRCA1/2 mutation could also increase the risk of male breast cancer (6), pancreatic cancer, prostate cancer -BRCA2 only (7), stomach cancer (8), and colorectal cancer (9). During the past decades, several studies have been conducted to examine the distribution and prevalence of BRCA1/2 mutations among different populations (10-14), including several studies in China (15-17). Notably, two studies in China have investigated the penetrance of breast cancer in BRCA1/2 mutation carriers (18,19), which provide evidence for the genetic counseling in China. Nevertheless, there are still many defects and many questions need to be answered. First, most studies conducted among Chinese are hospital-based research, and patients in some studies are recruited from one single city, limiting the application of results to larger populations. Hospital-based patient data, whose patients are opportunistic visits, may not reflect the real epidemiology in the population. Secondly, the BRCA1/2 gene testing based on high genetic risk groups cannot reflect the true incidence of gene mutations in the general population of breast cancer. In addition, due to the incomplete collection of family history information in previous studies, it is not possible to establish a prediction model for the probability of BRCA1/2 gene mutation in the Chinese population, nor to accurately calculate the breast cancer penetrance of mutation carriers. Moreover, current studies have shown that the commonly used clinical prediction models of BRCA1/2 gene mutations derived from Western populations perform well in Caucasian patients, but the accuracy rate is not high in Asian populations (20). Finally, the most important clinical significance of BRCA1/2 gene mutation detection lies in the early prevention and diagnosis of breast cancer. The best place for the management and implementation of primary prevention of breast cancer is not in the hospital, but in the community, so it is very important to carry out screening of breast cancer genetic susceptibility genes in the community. In order to fill the gaps in community research, we design an observational, prospective cohort study to screen genetic susceptibility genes of breast cancer patients in the Chinese community (from Eastern China, Jiangsu-Zhejiang-Shanghai Area) and establish a cohort of high-risk populations. This study plans to recruit breast cancer patients from some communities in China for BRCA1/2 mutation detection, understand the pathogenic mutation rate of BRCA1/2, PALB2, CHEK2, and PTEN genes in Chinese community breast cancer population, establish the BRCA1/2 pathogenic mutation carrier rate prediction model in the Chinese population, and accurately calculate the penetrance of breast cancer and other common malignant tumors in pathogenic mutation carriers. It is expected to carry out the unified management and follow-up of the high-risk population of breast cancer based on the community health service center, which will provide the basis for the research of early diagnosis, early prevention and intervention in the future. This is a multisite, prospective, cohort study which plans to begin in July 2019 and end in December 2022. The end date may be delayed due to the impact of the COVID-19 pandemic. Participant recruitment This study is carried out in Shanghai Municipality, Jiangsu Province and Zhejiang Province. These three provinces or municipality are adjacent to each other and located in the middle and lower reaches of the Yangtze River in eastern China. They are economically developed areas in China. Although China is a multi-ethnic country, the Han nationality accounts for 91.5%. In the area we study, the residents are basically Han nationality. Therefore, considering the regional convenience of patients' recruitment, the consistency of economic development level, and the unity of nationality and culture, we choose the breast cancer survivors of these three provinces or municipality as the research object. Our sample selection determines that our research can only represent data of breast cancer survivors in eastern China. At the same time, compared with the selection of all residents in the community as the research object, the choice of breast cancer survivors in the community is not perfect, but it should be the best choice considering the cost and effectiveness at present. All the recruitment of breast cancer survivors is carried out from the community. Shanghai Municipal Center for Disease Control and prevention (CDC) has been carrying out the registration of common malignant tumors in Shanghai since the 1960s. Therefore, the information of breast cancer survivors in Shanghai can be obtained directly from CDC. In Jiangsu Province and Zhejiang Province, since the local CDC have only started the registration of common malignant tumors in recent years, complete data cannot be obtained at the beginning of the recruitment, so it needs to be verified from other sources. The recruitment in Jiangsu Province is conducted in Jiangyin City. Jiangyin Cancer Club is an officially supported non-governmental group organized by cancer survivors themselves. With official support, the group can use the patient data registered by the local medical insurance bureau and hospitals to develop new members. Its registered members include almost all cancer survivors in Jiangyin city. We can use the club's information to recruit breast cancer survivors, and the data of local CDC can be appropriately supplemented. The recruitment in Zhejiang Province is conducted in Zhoushan City. Zhoushan is an archipelago, relatively isolated from the mainland. Because of the traffic, most of the local breast cancer patients are diagnosed and treated in Zhoushan Hospital, the largest hospital in the city. Zhoushan Hospital also organize a club for breast cancer survivors. Combined with information from the local medical insurance bureau, it can get the most complete information about breast cancer survivors in the city. This information is also used to recruit breast cancer survivors in Zhoushan city, and the data of local CDC can also be appropriately supplemented. Taking the community as the unit, sampling and information collection are carried out in batches. Each community collects blood samples and information at the same place in one day, with 50–200 patients each time. Two to four weeks before the time of sampling, the staff of the community health service center or cancer club will notify all the breast cancer survivors in the community by letter and telephone. The letter contains the promotional materials to illustrate the clinical significance of the detection of breast cancer susceptibility genes and the time and place of sampling in the community. The phone also tells the same content. We set the response rate of breast cancer survivors in the community to 70%. If we don't reach that response rate in the initial communication, we will try to recruit once again through letters and telephone calls. If two or more patients belong to the same family and have blood relationship, only the patient with the youngest onset age can be taken as the proband, and the other patients will be removed from the database and not included in the analysis. We estimate the sample size based on the pathogenic variant rate of BRCA1/2 in Chinese population. A minimum sample size of 1,927 produces a two-sided 95% confidence interval with a width equal to 2% when the pathogenic variant rate is 5%. We plan to recruit up to 5,000 breast cancer patients from communities. As of 2021, blood samples and information of 2,216 cases of breast cancer probands were collected from 13 communities in Jiangsu-Zhejiang-Shanghai Area. The data of 2,216 cases of probands compared with the breast cancer survivors registered by local CDC are shown in Table 1. But due to the reason of COVID-19, it is impossible to complete the collection work of 5,000 cases of breast cancer in 2022. We have applied for an extension to the ethics committee. The comparison between the data of breast cancer survivors recruited from this study and the data of all breast cancer survivors in the community provided by local CDC Patient's area Breast cancer survivors in this study* Breast cancer survivors registered by local CDC** Participation rate in this study Proportion of patients by age of onset <50 y ≥50 y Shanghai 689 33.2% 66.8% 1,085 38.8% 61.2% 63.5% Jiangsu 470 52.6% 47.4% 846 37.1% 62.9% 55.6% Zhejiang 1,057 47.9% 52.1% 1,589 36.2% 63.8% 66.5% Total 2,216 44.2% 55.8% 3,520 37.1% 62.9% 63.0% *, the time of recruitment is from July 2019 to March 2021; **, breast cancer survivors data provided by local CDC in June 2021. CDC, Center for Disease Control and prevention; y, years. Breast cancer survivors of any age; Both men and women; Subjects signed an informed consent form before being selected to express their consent to participate in the research and to comply with the research procedures. Healthy people who have not suffered from breast cancer or patients with other malignant tumors; Unable to interview the investigator and sign the informed consent form due to any reason; Unable to collect peripheral blood or oral mucosa samples for any reason. Biological samples and clinical genetic information collection In the letter and telephone notification before sampling, the patient is informed of the documents to be carried on the day of sampling, including ID card, medical insurance card/medical record card, discharge summary from the hospital, postoperative pathological report and immunohistochemical results. On the day of the sampling, the investigator organizes 6–10 doctors and research nurses to interview the patients on the spot, sign the informed consent form, fill in and review clinical and genetic information forms, collect family history information, and blood samples (4–5 mL venous blood) or oral mucosal samples. After the event, if the recapture patients wish to receive genetic testing, they can go to the community hospital to have an interview with the designated doctor. Clinical genetic information and biological samples are managed by the researcher. 4–5 mL of venous blood is divided into duplicates, one is kept in the tissue bank of Fudan University Shanghai Cancer Center, and the other is handed over to Shanghai AITA Biomedical Research Institute for BRCA1, BRCA2, PTEN, CHEK2 and PALB2 gene mutation detection. All gene mutation testing is free for patients. Clinical genetic information form All the participants record the following information at baseline: Personal information: including gender, age, birthplace, patrilineal and matrilineal origin. Basic information: menstrual status, fertility history, oral contraceptive status, drinking and smoking status. Important issues: Whether a breast cancer patient with other malignancies; Whether a breast cancer patient younger than 40 years old; also precise age at diagnosis; Whether a patient with bilateral breast cancer; Whether a triple-negative breast cancer patient; Whether there are any relatives in the family who are breast cancer patients? Whether there are any relatives in the family who are patients with other malignant tumors First and second-degree relatives' information: including the current age of parents, siblings and children, age of death (if any), the prevalence and survival of malignant tumors. All the above information will be collected in all patients. If any of the six questions in the "important issues" is answered "yes", the patient will be asked for a detailed family history and draw a pedigree. According to our current data, 62.7% of patients have drawn a pedigree. A family tree for the patient was constructed in accordance with guidelines of Pedigree Standardization Task Force (21). At the scene of collecting patients' clinical information and blood samples, each patient is assigned a unique barcode. The barcode has four copies, one on the informed consent form, one on the clinical and family history information questionnaire, and two on the blood sample collection tubes. One tube of blood sample collected on site is sent to Shanghai AITA Biomedical Research Institute for genetic testing, and the other tube of blood sample, together with the informed consent and questionnaire, is kept by the Fudan University Shanghai Cancer Center. When AITA receives the samples, all of them with barcode are registered into AITA Sample management system. The barcode is the only Identifier for all the samples in the DNA extraction, library construction and sequencing process. Mutation analyses Sample preparation and next generation sequencing are performed at the Shanghai AITA Biomedical Research Institute as previously described (22). Some small-scale studies (results unpublished) were conducted before the start of this study. It was found that the detection rate of TP53 and ATM was not high. Due to funding reasons, the research plan decides not to perform the mutation detection of these two genes. In previous studies, the RECQL gene was also included, but because Australian studies showed that RECQL gene mutation was not associated with breast cancer risk (23), the gene is not included in this study. Therefore, the genes selected in this study are BRCA1, BRCA2, PTEN, CHEK2, and PALB2. Multiplex-PCR primer design and preparation: The target-specific primers for the coding sequences of BRCA1 (NM_007300), BRCA2 (NM_000059), PALB2 (NM_024675), CHEK2 (NM_007194) and PTEN (NM_000314) genes are designed using Primer3 (http://bioinfo.ut.ee/primer3/). Universal sequences (CS1: ACACTGACGACATGGTTCTACA and CS2: TACGGTAGCAGAGACTTGGTCT) are appended at 5'-ends of each forward and reverse primer, respectively. Preamplification for tagged amplicon deep sequencing (Tam-Seq) is conducted in 6 mL PCR mixture containing 3 mL of KAPA 2G Robust HotStart ReadyMix (2X) (Kapa Biosystems, Boston, Massachusetts, United States), 1 mL of primer mix (500 nM), and 2 mL of DNA template (10 ng/mL). Sequencing barcode primers (Fluidigm Corporation, South San Francisco, California) consist of PE1 and PE2 sequences for Illumina cluster generation, a 10-bp barcode, and CS1 and CS2 adaptors, used in pairs (PE1-CS1/PE2-BC-CS2; PE1-CS2/ PE2-BC-CS1). For the DNA library, PCR products are barcoded and analyzed using gel electrophoresis to ensure the expected insertion size. The library is quantified by Agilent BioAnalyzer and sequenced using the Illumina Xten platform with paired-end reads of 150 bp per the manufacturer's instructions. Custom sequencing primers for CS1 and CS2 target the paired reads, and 10-base indexing (barcode) reads per the recommendations of Fluidigm. Sequencing reads are aligned to the hg19 reference genome using BWA1 (http://bio-bwa.sourceforge.net). Genome Analysis Toolkit (GATK) 2 (https://software.broadinstitute.org/gatk/) is used for base quality score recalibration, indel realignment, and variant calling base on the following criteria: (I) QD <2.0; (II) MQ <40.0; (III) MQRankSum <−12.5; and (IV) ReadPosRankSum <−8.0. Variant functions are predicted using SnpEff (http://snpeff.sourceforge.net), PolyPhen-2 (http://genetics.bwh.harvard.edu/pph2/), PROVEAN (http://provean.jcvi.org/index.php), and SIFT (http://sift.jcvi.org). Variant population frequency is annotated with the ExAC database (http://www.gnomad-sg.org), the 1,000 Genomes database (https://www.internationalgenome.org), and an internal database. Only novel BRCA1/2 variants or variants with <1% population frequency in 1,000 Genomes or ExAC are collected. Clinical significance of each variant is annotated according to ClinVar (https://www.ncbi.nlm.nih.gov/clinvar/), ACMG-AMP guidelines and other supporting evidence from the public literature and curated databases. Variants are manually inspected with Integrative Genomics Viewer (http://www.igv.org/), to exclude false-positives. Classification of variants is collapsed from a 5-tier to 3-tier classification system comprised of pathogenic and benign variants, and VUS. All pathogenic variants are validated by Sanger sequencing. Because even in patients with high risk of breast cancer, the detection rate of large genomic rearrangements of BRCA1/2 was not high (24). In view of the cost, the MLPA method is not used in this study. Shanghai AITA Biomedical Research Institute delivers the results of the participants' genetic mutation test to the researcher. The researcher informs the patient's community health service center of the test result. The participants with variants of benign, likely benign and uncertain significance are notified by the community health service center without special treatment, and only continue with routine treatment and follow-up. The participants with variants of pathogenic and likely pathogenic are recommended to be notified by the investigator and discuss follow-up intervention plan in person. The notification content includes: the significance of gene variants, the necessity and possibility of family verification (once the patient agrees, the verification of the pathogenic or likely pathogenic variants of blood-relatives is also free), the risk of (contralateral) breast cancer, ovarian cancer and other malignant tumors for mutation carriers, the follow-up plans, the possibility of preventive surgery, and relevant information about targeted drug (PARP inhibitor drugs) intervention, etc. Ethics and dissemination This study was approved by the Fudan University Shanghai Cancer Center Institutional Review Board (Registration No. 1905202-3). The study will be conducted in accordance with the Declaration of Helsinki (as revised in 2013). Patients will be told the details of the study (purpose, risk and benefits), and patients have the right to quit any time. An informed consent form will be sent to each patient prior to enrollment to ensure that each patient understands the cohort study. The process of obtaining informed consent is in accordance with the Good Clinical Practice of Pharmaceutical Products (GCP) requirements. The results of this study will be presented at national and international meetings and published in a scientific peer-reviewed journal. Patients and/or the public were involved in the design, or conduct, or reporting, or dissemination plans of this research. Refer to the Methods section for further details. An important aspect of the clinical significance of detecting genetic susceptibility genes for breast cancer is to be able to identify genetically susceptible populations from the general population, so as to carry out early diagnosis and prevention of breast cancer. The results of Olaparib clinical studies (25) in recent years make it possible to treat BRCA1/2 mutation-positive breast cancer patients with targeted therapy, thus promoting the development of genetic testing. In order to clarify the value of BRCA1/2 and other genetic susceptibility genes for early diagnosis and prevention of breast cancer, the information on the proportion of mutation carriers in the population, who are more likely to carry genetic mutations, and the cancer risk of mutation carriers are very important. That information directly determines the necessity of genetic testing and early prevention, including preventive surgery. There have been many studies on these in the Western population, but there is still a lack of large-scale reports among the Chinese population. As a result, the current diagnosis and treatment routines performed in the Chinese population are based on the guidelines obtained from the data of the Western population. However, a small number of studies have shown that the data of the Chinese population, especially the cancer risk of mutation carriers, are very different from those of the Western white population. This also raises questions: Is it necessary to promote expensive and traumatic preventive surgery among Chinese mutation carriers, if the risk of breast cancer in Chinese mutation carriers is much lower than that in Western populations? An important method currently used to calculate the penetrance of mutation carriers is based on the family history of the proband. After identifying the proband, the researchers first collect information on close relatives at risk, then establish the probability that each relative is a carrier of a mutation in BRCA1/2 by use of Mendelian inheritance, and finally count cumulative breast cancer events and estimate age-specific risks, after adjusting for the probabilities that the contributing family members are carriers. A key assumption in these methods is that the risks are presumed to be same no matter for family members of a carrier who is a case patient or a control subject (26). Therefore, the sample selection is very critical, and we must strive to make the selected sample representative of the entire population. The ideal situation is to randomly select any individual from the population, regardless of whether they have cancer or not. However, the mutation rate of breast cancer genetic susceptibility genes in healthy people is very low. In order to obtain enough mutation carriers, more testing is needed, which makes the research more expensive. Therefore, most studies have selected breast cancer patients as research subjects. Because the mutation detection rate in patients is much higher than that of normal people, which improves the efficiency of detection and greatly saves research costs. In addition, there is another problem in selecting patients as samples. Because in the same case of carrying mutations, breast cancer patients and healthy people may have different risk factors other than mutations, which will cause bias. At present, the research reporting the penetrance rate of BRCA1/2 mutation carriers in the Chinese population all come from patient samples in the hospital. One of the research samples came from a genetic high-risk clinic in a hospital (18), and the other were samples of consecutive patients admitted in the hospital (19). These studies are highly likely to overestimate the penetrance of the Chinese population due to sampling errors. Our research selects breast cancer patients in a specific geographic area from the communities, collects all patients as much as possible to enter the study, eliminates the factor of sample selection bias, so that the research sample can represent the entire population as much as possible. Although it cannot be compared with a sample randomly selected from the entire population, it should be the most economical and effective sample among the Chinese population so far. Gail raised some limitations of the kin-cohort design (27), we try to reduce the impact of these limitations through the study design. To reduce the selection bias, as described above, we recruit breast cancer patients in the community, regardless of their family history of breast cancer or other malignancies, rather than recruiting breast cancer patients with genetic predisposition in genetic high-risk clinics. For the information bias from inability of the proband to recall the disease histories of relatives accurately, the community we select is located in the economically developed eastern region of China, and the patient's education level is high, which can ensure more accurate family history information. We also leave contact information for further supplementary use. Finally, we strictly review each patient's family history to ensure that none of the patients were related to each other by blood, while maximizing the sample size to reduce bias. Most of the existing models used to predict BRCA1/2 gene mutations are derived from data among western populations, but it has great limitation to apply these models to Chinese populations. Kurian et al. (20) used BRCAPRO and Myriad II to predict the BRCA1/2 gene mutations in Asian and Caucasian patients, and found that these two models performed well in whites, but only about 50% of mutation carriers can be predicted in Asian patients. Especially the BRCA2 gene mutations can only be predicted 1/6 of the actual. Researchers believe that it is due to differences in the incidence of BRCA1/2 gene mutations, penetrance, and the incidence of breast cancer among different races or ethnicity groups. Therefore, it is also crucial to use the Chinese population's own data to establish a gene mutation prediction model suitable for the Chinese population. In recent years, with the development of next-generation sequencing technology, the cost of BRCA1/2 gene mutation detection has dropped significantly. At the same time, due to the inability to find a perfect prediction model with an accuracy of 100%, some researchers suggested that all breast cancer patients should be tested for BRCA1/2 gene mutations, and there is no need to apply prediction models for pre-detection evaluation (28). Studies have shown that the proportion of BRCA1/2 gene mutations in Chinese breast cancer patients is similar to that of Western populations, only about 5% (22). Even if the cost of testing is much lower than before, in a populous country like China, testing all breast cancer patients in order to find about 5% of mutation carriers will still consume a lot of medical resources. Therefore, the establishment of a mutation prediction model suitable for the Chinese population still has high socio-economic value. Funding: This work was supported by the Shanghai Committee of Science and Technology Funds (Grant No. 14441901402 to ZH) and AITA Biomedical Research Institute Breast Cancer Genetic Susceptibility Gene Research Fund to YL. Conflicts of Interest: All authors have completed the ICMJE uniform disclosure form (available at https://pcm.amegroups.com/article/view/10.21037/pcm-22-36/coif). ZS serves as an unpaid Executive Editor-in-Chief of Precision Cancer Medicine from April 2018 to March 2023. The other authors have no conflicts of interest to declare. Ethical Statement: The authors are accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved. This study was approved by the Fudan University Shanghai Cancer Center Institutional Review Board (Registration No. 1905202-3). The study will be conducted in accordance with the Declaration of Helsinki (as revised in 2013). An informed consent form will be sent to each patient prior to enrollment to ensure that each patient understands the cohort study. Open Access Statement: This is an Open Access article distributed in accordance with the Creative Commons Attribution-NonCommercial-NoDerivs 4.0 International License (CC BY-NC-ND 4.0), which permits the non-commercial replication and distribution of the article with the strict proviso that no changes or edits are made and the original work is properly cited (including links to both the formal publication through the relevant DOI and the license). See: https://creativecommons.org/licenses/by-nc-nd/4.0/. Sung H, Ferlay J, Siegel RL, et al. Global Cancer Statistics 2020: GLOBOCAN Estimates of Incidence and Mortality Worldwide for 36 Cancers in 185 Countries. CA Cancer J Clin 2021;71:209-49. [Crossref] [PubMed] Zhang S, Sun K, Zheng R, et al. Cancer incidence and mortality in China, 2015. Journal of the National Cancer Center 2021;1:2-11. [Crossref] Fackenthal JD, Olopade OI. Breast cancer risk associated with BRCA1 and BRCA2 in diverse populations. Nat Rev Cancer 2007;7:937-48. [Crossref] [PubMed] Nathanson KL, Wooster R, Weber BL. Breast cancer genetics: what we know and what we need. Nat Med 2001;7:552-6. [Crossref] [PubMed] Kuchenbaecker KB, Hopper JL, Barnes DR, et al. Risks of Breast, Ovarian, and Contralateral Breast Cancer for BRCA1 and BRCA2 Mutation Carriers. JAMA 2017;317:2402-16. [Crossref] [PubMed] Tai YC, Domchek S, Parmigiani G, et al. Breast cancer risk among male BRCA1 and BRCA2 mutation carriers. J Natl Cancer Inst 2007;99:1811-4. [Crossref] [PubMed] Oh M, Alkhushaym N, Fallatah S, et al. The association of BRCA1 and BRCA2 mutations with prostate cancer risk, frequency, and mortality: A meta-analysis. Prostate 2019;79:880-95. [Crossref] [PubMed] Cavanagh H, Rogers KM. The role of BRCA1 and BRCA2 mutations in prostate, pancreatic and stomach cancers. Hered Cancer Clin Pract 2015;13:16. [Crossref] [PubMed] Oh M, McBride A, Yun S, et al. BRCA1 and BRCA2 Gene Mutations and Colorectal Cancer Risk: Systematic Review and Meta-analysis. J Natl Cancer Inst 2018;110:1178-89. [Crossref] [PubMed] Jara L, Morales S, de Mayo T, et al. Mutations in BRCA1, BRCA2 and other breast and ovarian cancer susceptibility genes in Central and South American populations. Biol Res 2017;50:35. [Crossref] [PubMed] Abdulrashid K, AlHussaini N, Ahmed W, et al. Prevalence of BRCA mutations among hereditary breast and/or ovarian cancer patients in Arab countries: systematic review and meta-analysis. BMC Cancer 2019;19:256. [Crossref] [PubMed] Sharma P, Klemp JR, Kimler BF, et al. Germline BRCA mutation evaluation in a prospective triple-negative breast cancer registry: implications for hereditary breast and/or ovarian cancer syndrome testing. Breast Cancer Res Treat 2014;145:707-14. [Crossref] [PubMed] Bergman A, Flodin A, Engwall Y, et al. A high frequency of germline BRCA1/2 mutations in western Sweden detected with complementary screening techniques. Fam Cancer 2005;4:89-96. [Crossref] [PubMed] Palomba G, Pisano M, Cossu A, et al. Spectrum and prevalence of BRCA1 and BRCA2 germline mutations in Sardinian patients with breast carcinoma through hospital-based screening. Cancer 2005;104:1172-9. [Crossref] [PubMed] Suter NM, Ray RM, Hu YW, et al. BRCA1 and BRCA2 mutations in women from Shanghai China. Cancer Epidemiol Biomarkers Prev 2004;13:181-9. [Crossref] [PubMed] Li WF, Hu Z, Rao NY, et al. The prevalence of BRCA1 and BRCA2 germline mutations in high-risk breast cancer patients of Chinese Han nationality: two recurrent mutations were identified. Breast Cancer Res Treat 2008;110:99-109. [Crossref] [PubMed] Zhang J, Pei R, Pang Z, et al. Prevalence and characterization of BRCA1 and BRCA2 germline mutations in Chinese women with familial breast cancer. Breast Cancer Res Treat 2012;132:421-8. [Crossref] [PubMed] Zhang L, Shin VY, Chai X, et al. Breast and ovarian cancer penetrance of BRCA1/2 mutations among Hong Kong women. Oncotarget 2018;9:25025-33. [Crossref] [PubMed] Yao L, Sun J, Zhang J, et al. Breast cancer risk in Chinese women with BRCA1 or BRCA2 mutations. Breast Cancer Res Treat 2016;156:441-5. [Crossref] [PubMed] Kurian AW, Gong GD, Chun NM, et al. Performance of BRCA1/2 mutation prediction models in Asian Americans. J Clin Oncol 2008;26:4752-8. [Crossref] [PubMed] Bennett RL, French KS, Resta RG, et al. Standardized human pedigree nomenclature: update and assessment of the recommendations of the National Society of Genetic Counselors. J Genet Couns 2008;17:424-33. [Crossref] [PubMed] Liu Y, Wang H, Wang X, et al. Prevalence and reclassification of BRCA1 and BRCA2 variants in a large, unselected Chinese Han breast cancer cohort. J Hematol Oncol 2021;14:18. [Crossref] [PubMed] Li N, Rowley SM, Goode DL, et al. Mutations in RECQL are not associated with breast cancer risk in an Australian population. Nat Genet 2018;50:1346-8. [Crossref] [PubMed] Park B, Sohn JY, Yoon KA, et al. Characteristics of BRCA1/2 mutations carriers including large genomic rearrangements in high risk breast cancer patients. Breast Cancer Res Treat 2017;163:139-50. [Crossref] [PubMed] Tutt ANJ, Garber JE, Kaufman B, et al. Adjuvant Olaparib for Patients with BRCA1- or BRCA2-Mutated Breast Cancer. N Engl J Med 2021;384:2394-405. [Crossref] [PubMed] Begg CB. On the use of familial aggregation in population-based case probands for calculating penetrance. J Natl Cancer Inst 2002;94:1221-6. [Crossref] [PubMed] Gail MH, Pee D, Carroll R. Kin-cohort designs for gene characterization. J Natl Cancer Inst Monogr 1999;55-60. [Crossref] [PubMed] Beitsch PD, Whitworth PW, Hughes K, et al. Underdiagnosis of Hereditary Breast Cancer: Are Genetic Testing Guidelines a Tool or an Obstacle? J Clin Oncol 2019;37:453-60. [Crossref] [PubMed] Cite this article as: Wang Z, Yu S, Feng X, Qiu X, Ji H, Shan H, Shao Q, Xia H, Cao F, Li J, Fu C, Chen L, Lu X, Su T, Yu Q, Hou S, Wang H, Liu Y, Zheng Y, Shao Z, Hu Z. Protocol: screening of genetic susceptibility genes for breast cancer patients and establishment of genetic high-risk populations cohort in east china communities. Precis Cancer Med 2022;5:36. PDF 59 views Full Text 76 views COI Form Aims and Scope Precision Cancer Medicine (PCM, Precis Cancer Med, ISSN: 2617-2216) is an open access, peer-reviewed online journal dedicated to precise diagnosis and treatment of cancers and... AME Case Reports AME Medical Journal AME Surgical Journal Annals of Blood Annals of Breast Surgery Annals of Cancer Epidemiology Annals of Cardiothoracic Surgery Annals of Esophagus Annals of Eye Science Annals of Infection Annals of Joint Annals of Laparoscopic and Endoscopic Surgery Annals of Lymphoma Annals of Nasopharynx Cancer Annals of Pancreatic Cancer Annals of Research Hospitals Annals of Thyroid Annals of Translational Medicine Art of Surgery Australian Journal of Otolaryngology Biotarget Cardiovascular Diagnosis and Therapy Chinese Clinical Oncology Current Challenges in Thoracic Surgery Digestive Medicine Research ExRNA Frontiers of Oral and Maxillofacial Medicine Gastrointestinal Stromal Tumor Gland Surgery Gynecology and Pelvic Medicine Hepatobiliary Surgery and Nutrition Journal of Emergency and Critical Care Medicine Journal of Gastrointestinal Oncology Journal of Hospital Management and Health Policy Journal of Laboratory and Precision Medicine Journal of Medical Artificial Intelligence Journal of Oral and Maxillofacial Anesthesia Journal of Public Health and Emergency Journal of Spine Surgery Journal of Visualized Surgery Journal of Xiangya Medicine Mesentery and Peritoneum Microphysiological Systems Non-coding RNA Investigation Precision Cancer Medicine Pharmacogenomics Research and Personalized Medicine Quantitative Imaging in Medicine and Surgery Shanghai Chest Stem Cell Investigation Therapeutic Radiology and Oncology Translational Breast Cancer Research Translational Andrology and Urology Translational Gastroenterology and Hepatology Translational Pediatrics Video-Assisted Thoracic Surgery More Journal Copyright © 2009 - 2023 AME Publishing Company. All rights reserved. Published by AME Publishing Company Address: Flat/RM C 16F, Kings Wing Plaza 1, NO. 3 on Kwan Street, Shatin, NT, Hong Kong, China. Email: [email protected]
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Sacred Heart Catholic School operates a breakfast and lunch program. The cost of lunch is $2.75 and breakfast is $1.75. Please send payment in an envelope with each child's name and grade marked on it. Families may send one check and it will be divided among siblings. If you would like to eat with your child in the cafeteria, please call the office by 9:00 a.m. to reserve a lunch. Remember to sign in at the school office before going to the cafeteria. Payment for the adult lunch should be made in the office. Guests may not charge their lunch to their child's account. Occasionally the lunch menu may be changed without notice due to unforeseen circumstances. Sacred Heart participates in the federal lunch program sponsored by the United States government. This program provides for free or reduced breakfast and lunch to qualifying families. The application is available through the school office. You must apply each year. Until the application is approved and parents are notified, the cost for lunch is $2.75 and breakfast is $1.75. Parents are advised to complete and turn in the application before school starts. As part of the federal lunch program, each school must publish the federal government's procedure on how to file a Civil Rights complaint. The procedure follows: all complaints, written or verbal, will be accepted by SHCS and submitted to the School Nutrition Programs, Oklahoma Department of Human Services or sent directly to Director, Office of Civil Rights, 1400 Independence Avenue, SW Washington, D.C. 20250-9410, or 800-795-3272 (voice) or 202-720-6382 (TTY). It is necessary that the information provided be sufficient to determine the identity of the agency or individual toward which the complaint is directed, and to indicate the possibility of a violation. Only the USDA Director of Civil Rights can reject a complaint based on lack of merit. Anonymous complaints shall be handled as any other complaint. The federal lunch program requires that milk be served with the meal. Students who are allergic to milk must provide the school cafeteria with a doctor's note indicating the allergy. Juice will be substituted for milk in those cases. This must be provided each year. There is not a microwave oven available for student use. Fast food lunches (McDonald's, Sonic, etc.) may not be brought to school for lunch. Students may not bring glass containers or carbonated beverages. All food must be consumed in the cafeteria unless the classroom teacher gives permission. Breakfast from home must be consumed before entering the cafeteria. Students in grades 6 – 8 may purchase extra items from the cafeteria. Students on the free or reduced lunch program may also purchase extra items; however, the extra items must be paid for at the full cost. Students on the free or reduced lunch program who bring a lunch from home and take milk or juice will be charged the full price for the milk or juice.
{ "redpajama_set_name": "RedPajamaC4" }
Focus – Yardbirds Rock Club Grimsby 27 Nov 2022 on Nov 28, 2022 November 29, 2022 Focus was the most successful and appreciated of all Dutch music exports back in the 70s. Fronted by founding member Thijs Van Leer, and best known for their hits "Hocus Pocus" and "Sylvia", I remember buying 'Moving Waves' on cassette and seeing schoolmates looking cool with the LP 'Hamburger Concerto' under their arms. After a comeback in the early 2000's which resulted in the inventively titled, well-received albums 'Focus 8' and 'Focus 9', the band regrouped around Thijs van Leer (vocals, flute and keyboards), and drummer Pierre van der Linden (who originally joined the group on their second album 'Moving Waves' in 1972). Guitarist Menno Gootjes, a previous band member, and bass player Udo Pannekeet complete the band's current line-up. Photos by David Pearson With this new Focus era comes a rejuvenated passion, evidenced in 2019's Focus 11. A worldwide pandemic may have halted the 50th Anniversary celebrations, but here they are happy to be back on stage, at home, at play and at work. Focus have been masters of their chosen trade for decades. A progster's dream combination of whimsical depth and seemingly simple complexity combine to produce a glorious instrumental musicianship. And the gig serves only to underline that summary Maybe they don't play to huge audiences. Maybe the venue sees the loudest members of the audience jostling at the bar, conversing loudly over the quiet concentration of the musicians, distracting those who came to enjoy the band. Just like old CRS days……. This was a sublime expression of musical nostalgia and instrumental nonchalance that deserved a better presentation, more attentive audience and greater acclaim. I applaud them for starting in such a low-key, delicate manner as Focus 1, before reminding us of their first, albeit lesser, hit House of the King. But then they launch into the epic, lengthy Eruption, and it's all on display. Prog subtlety and nonsense, finger-twisting pyrotechnics, languid blues, self-indulgent solos. The lot. Time to wallow. For me, one of the highlights was Focus 7. What a gorgeous number, beautifully played. And then, with indecent haste almost, we race to the interval with the legendary Sylvia. The audience ears prick up, the band are in full entertainment mode, and it's an electrifying close. Go have a beer or two and buy some merchandise, suggests the old timer Thijs Van Leer before fighting his way over a monitor to get to the back of the stage. Clambering back onstage through the tight racks of equipment, Van Leer dedicates the first number to ex-bassist Bert Ruiter, who died in early 2022. I didn't know he was dead, said the bloke with Focus gig T-shirt who passed me on the way to the gents, just as the emotive song commenced. A great track that sums up Focus perfectly: melodic yet raucous, uplifting or enlivening, but thoughtful yet frivolous. Another explanation leads us into the excellent La Cathedral Strasbourg. As the late Leslie Phillips would have said in another context- ding dong! (you had to be there….). Harem Scarem allows the band to let loose, solo slots galore, galloping frivolity and a clearly evident enjoyment of the music aplenty. And so to the last, but lengthy, set closer at ridiculous speed – Hocus Pocus. More solo slots, more clever interaction, more fun and frivolity, more dexterous instrumental brilliance. And that's it. I'm told there's new music on the way, and I look forward to it. In the meantime I'm so pleased to have had the experience that is the one and only Focus. Inventive. Impressive. Idiosyncratic. Current Line Up: Thijs van Leer – Hammond-organ -flute and vocals Pierre van der Linden – drums Menno Gootjes- guitar Udo Pannekeet – bass House of the King For Bert La Cathedral Strasbourg Harum Scarum Gig, Live, Live Gig, Live Music, Live Review, Review Previous: News of a Jethro Tull album Next: Roots in December
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
At CA Lending®, an important part of our commitment to you is respect for your right to privacy when applying for a car loan. Keeping your information and affairs in strict confidence is a cornerstone of our business and an integral part of our commitment to service excellence. This policy will help you better understand how CA Lending® protects, collects, uses and discloses your personal information and your right to access your information. This policy applies to CA Lending®'s clients (including potential clients) in Canada. To understand the meaning of "personal information" and other terms used throughout this policy, please refer to the Important Terms section. When reading this policy you should be aware of the meanings we give to the following terms. When we refer to "personal information" or "information" it means information about an identifiable individual. This includes details such as your age, marital status, education, employment history, identification numbers, financial information and credit records. Personal information does not include most of the information that appears on a business card. When we refer to "CA Lending®", "we", "our" or "us" or "CALC" it means the "CANADIAN AUTOMOTIVE LENDING CORPORATION" and each of its subsidiaries that offer loans, or other products and services. When we refer to "you" and "your" it includes co-applicants, guarantors, or personal or authorized representatives. When we refer to "permitted or required by law", and "legal and regulatory" requirements, authority or restrictions, this includes law, regulation, rules or requests of the regulators or self-regulatory organizations which apply to CA Lending®. At CA Lending®, keeping your information and affairs in strict confidence is an integral part of our commitment to you. CA Lending® respects the following principles when collecting, using, disclosing and protecting your personal information. We identify the purposes for collecting personal information at or before the time it is collected. We obtain your consent before collecting, using or disclosing personal information, except where permitted or required by law. We limit the personal information we collect to what is necessary for the purposes we have identified. We collect information only by fair and lawful means. We do not use or disclose personal information for purposes other than those for which it was collected, except with your consent, or where permitted or required by law. We retain personal information only as long as necessary for these purposes. We take care to keep personal information as accurate, complete and up-to-date as is necessary for the purposes for which it is to be used. Upon request, we provide you with access to your personal information. You can ask how your information is used or disclosed, can ensure it is accurate and complete, and can update it if necessary. We safeguard the privacy of personal information through security measures appropriate to the sensitivity of the information. We are responsible for personal information under our control. There are designated individuals within CA Lending® who are accountable for compliance with these privacy principles. We make available to you, information about our policies and practices related to managing your personal information. We address your concerns. We have steps you can follow if you have questions or concerns about your privacy. If we need your information for any other purpose, we will identify that purpose. We obtain most of your personal information directly from you and through the products and services you use. Some information may be obtained from other sources. For example, with your consent, we may verify some of the information you give us with your employer or your references. Generally, when we obtain information from someone other than you, such as a credit bureau, we record the source of that information. We may review and analyze your applications, transactions and other personal information. We may do this to offer solutions that help meet your needs, and to develop new products and strategies to meet the needs of our clients. We may also do this to help us identify various types of risks such as credit, fraud, and money laundering. We may monitor and record telephone calls between you and our representatives to ensure accuracy, security, service quality and for training purposes. If you have a product or service where ownership or liability is shared with others (for example, you have a joint account or you have a guarantor for your loan), we may share your information with them in connection with the product or service. Also, if you authorize us, we may provide your information to your lawyer, accountant, or others you've identified. Except as explained in "There are exceptions to obtaining consent" under Part II. of this policy, we don't disclose information about you to anyone outside of CA Lending® without your consent. Similarly, if we intend to use your information for a purpose we didn't tell you about previously, we will obtain your consent. CA Lending® may obtain your express consent in writing, through electronic means, or verbally. Alternatively, your consent may be implied through an action you've taken or when you continue to use a product or service after we've notified you of a change. In some cases, we are required by law to obtain your express consent, in which case we ensure that we do so. Electronic – You may be asked to electronically acknowledge that you will be bound by legal terms. Clicking "Submit" is your electronic consent. Verbal – A CA Lending® representative asks whether you agree to us obtaining your credit bureau information. Saying you agree is your verbal consent. There are several common consents that may apply in your relationship with us. They are described below to help you understand when you can refuse or withdraw your consent and when this right is limited. Refusing or withdrawing your consent will generally not affect your eligibility for CA Lending® offers. However, if you refuse or withdraw your consent, we may not be able to provide you with a particular product or service. We'll explain the impact on you at the time, to help you with your decision. From time to time, we may offer you products and services – including special promotions – that we believe will be of interest to you through various channels including direct mail, telephone, electronically or other means. This consent is optional and you can decide to withdraw it at any time. If you withdraw your consent to receive direct marketing, this will not limit the information provided to you through discussions with a CA Lending® representative or information we may send you that is permitted or required by law or related to your existing products or services. We may share information about you within CA Lending® for legal and regulatory purposes, to manage credit risk and other business risks, to perform analytics, and to ensure we have correct and up to date information about you, such as your current address, date of birth, etc. You may not withdraw consent for this sharing. When we receive information from or update your information with a credit bureau, your SIN is the best way to make sure that the information actually refers to you. Wrong information could lead us to draw wrong conclusions about you. You should be aware, though, that permitting us to use your SIN in this way is voluntary for you. If you choose not to give us your SIN when its collection is optional, or tell us you do not want us to use it for credit bureau purposes, this by itself will not prevent you from getting any products or services. When you apply for certain products and services, we obtain your consent to exchange information about you with credit bureaus. In order to maintain the integrity of the credit reporting system, we may periodically update your information with credit bureaus as long as you have the product or service with us and for a period of time afterwards. Your consent to the exchange of information cannot be withdrawn during that time. While we collect various types of personal information from you and other sources, we limit the information to what is necessary for the purposes we've identified. The information we ask for depends on the product or service requested. As well, we may need to ask new questions because of changes in legal and regulatory requirements. We require information to meet our various "know your client" legal and regulatory requirements. For example, we need your name, address, birth date, occupation, citizenship and identification for many products and services to meet anti-money laundering requirements. We may also be required to ask for information on how you use our products or services. We require financial information to assess your eligibility for products and services, and to assess credit and other limits. Financial information may include account records, tax returns, financial statements, employment income and credit information. We may be required to collect and disclose your SIN to comply with legal or regulatory requirements. Further, if you have provided your SIN it may also be used as an internal identification number to accurately identify customers having the same or similar names. We do not use or disclose personal information for purposes other than those for which it was collected, except with your consent, or as described below. We retain personal information only as long as necessary for these purposes. There are exceptions to obtaining consent. If we use an outside supplier to do work for us. At times we may use outside suppliers to do work for us involving some of your information. For example, we may use suppliers to print statements, conduct telemarketing, collect accounts or process transactions on our behalf. We select suppliers carefully and insist they have privacy and security standards that meet CA Lending®'s strict requirements. If we are permitted or required by law. We may be compelled to release information by a court or other legal or regulatory authority. If so, our policy is to release information only to the extent that we are required to do so. We may also collect, use or disclose information without consent where permitted by law. For example, we may collect and use publicly available information like information in the telephone book for marketing or customer service purposes. Further, for legal, medical or security reasons, it may be impossible or impractical for us to obtain your consent. If we have to protect the interests of CA Lending®. In certain circumstances, CA Lending® may have to collect, use or release information without consent for its protection. For example, we may do so when collecting an overdue account, when realizing on security pledged for a loan, or to detect or prevent fraud. If we cannot locate you, we may obtain contact information from other sources, such as government agencies and registries, and public records. We may share information for business transactions. From time to time, we may sell parts of our business, insure, sell or securitize assets, or merge or amalgamate parts of our business with other parties. Since client and account information will normally be a part of the transaction, we may disclose this information to other parties in the transaction, as part of due diligence and on completion of the transaction. We require that the other parties keep this information confidential and limit its use to the purposes of the transaction. Information may be located outside of Canada. CA Lending®, its outside suppliers and other third parties to whom we disclose information under this policy (such as credit bureaus) may perform activities outside of Canada. As a result, your information may be securely used, stored or accessed in other countries and may be subject to the laws of those countries. For example, information may be disclosed in response to valid demands or requests from government authorities, courts, or law enforcement in these countries. The length of time we keep your information will vary depending on the product or service and the nature of the personal information. We have retention standards that meet customer service, legal and regulatory needs. For these reasons, we may keep your information beyond the end of your relationship with us. When your information is no longer required, we securely destroy it or delete personally identifiable information. We take care to keep the information in our records as accurate, complete and up to date as necessary for the purposes for which it is used. However, we also rely on you to tell us when your personal information changes. It is important to ensure your personal information at CA Lending® is accurate and complete. This allows us to continue to offer the highest quality service and to suggest products and services that best meet your needs. Contact the office where your account is held talk to your CA Lending® representative. Your personal information is available to you through by visiting the office you deal with. If you require further information, please request this by contacting the office you deal with. We will ask that you put your access request in writing (usually, by completing a form) and that you provide us with enough specific details in order to help us understand your request and conduct our search for your information. We will need you to verify your identity before searching for or providing you with access to your information. We will respond to your access request within 30 days upon receiving all necessary information, or advise you in writing if we require additional time. We may charge a fee to provide access to your information. We will let you know in advance if there is a charge. If you have a sensory disability you may request your information to be made available in an alternative format. If we already have that format, we will provide it. Otherwise we will convert the information into the requested format if it is reasonable and necessary under legislation to enable access. It may not be appropriate for us to release certain types of information to you. For example, our records may contain information about other clients, information that is confidential or proprietary to CA Lending®, or information that is subject to legal privilege. Because we must protect everyone's confidentiality and legal rights, we cannot make this information available to you. However, where possible, we will suppress this information and provide you with access to the remaining records. If we are unable to provide access or disclose information to you, we will explain why, subject to any legal or regulatory restrictions. If we have obtained information about you from others, you can ask us for the source of that information. On request, and where legally permitted, we'll provide you with the names of outside companies or organizations to whom we've given or may have given your personal information. However, this won't include outside suppliers we've used to do work for us, such as conducting telemarketing, or processing information for us. This also won't include reports to the Canada Revenue Agency, or information that has been provided for legal or regulatory reasons. If you tell us that we have information about you that is obsolete or incorrect, we will update our records with the proper information. When appropriate, we'll correct any information which we may have given to an outside organization. If you request access to a credit report we obtained about you from a credit bureau, we will give you a copy if we still have it on file. We will provide you with the name and address of the credit bureau we used. They will have the most current information and they can provide you with information on how to read the report. You have the right to access and correct the credit report directly with the credit bureau. We limit access to your personal information and store it securely. Depending on the nature of the information, it may be stored in the office you deal with, in various secure computer systems, or the record storage facilities of CA Lending® or our outside suppliers. In addition to the physical and electronic security devices we use to protect your information, we have security standards to protect our computer systems and your information from unauthorized use or access. Our systems also protect your information when it is electronically transmitted. We regularly audit our information security procedures and assess that they remain effective and appropriate. Employees who have access to your information are made aware of how to keep it confidential. Each employee must sign an agreement stating that maintaining confidentiality is a condition of employment with CA Lending®. Also, each year employees undergo a review of our Code of Conduct and certify they will abide by CA Lending®'s ethical and professional standards including the obligation of confidentiality and privacy. We use contracts and other measures with our outside suppliers to maintain the confidentiality and security of your personal information and to prevent it from being used for any unauthorized purpose. Access to your personal information is only given to those who require it to provide our products or services, or where permitted or required by law. Making sure that CA Lending® has your most up-to-date address or contact information will help protect your personal information from being misdirected. In "We work with you to keep your information accurate" under Part III. of this policy, we explain how to check and update your personal information. To protect your privacy online, you should clear your browser's cache after each session, use a firewall, and use up to date software to protect your computer from viruses and spyware. If you receive a suspicious phone call, e-mail or letter, contact us.
{ "redpajama_set_name": "RedPajamaC4" }
There is no magic — deconstructing "genius" "Genius" was an idea that the layman would marvel at, an incomprehensible leap in human mind that seemed more surreal than relatable. Like much of science, this too has now been daintily plucked from the "magical mystery" basket and gently placed in the "oh that makes sense" zone. We now understand that the third ingredient, raw analytic intelligence, is necessary only as a dough, but it is relentless curiosity and a surplus of mentors and encouraging peers which decides how many theorems the recipe makes, and how delicious they taste. The first two things can be selected for when building a team environment, with the environment itself set up to provide the third.
{ "redpajama_set_name": "RedPajamaC4" }
I love this product. First use, I saw a difference in my droopy eyelids! Ive tried lots of products but this one is perfect! it is the best makes me look younger people can not tell my age love it 5 star LISA K. I have been using Revitalift double lifting for many years. It really works!! Love it!!! I'm 52 years old and this stuff smooths out the wrinkles around my eyes. Amazing lifting of upper eyelids! Lifts the upper eyelid and gets rid of puffiness. Love it!
{ "redpajama_set_name": "RedPajamaC4" }
North London A8 - Bantam Alliance Champions!!! The North London A8 Bantam team had a great year. They worked hard all year and learned from Jeff's coaching which all led to a super effort in the Alliance Championship!! North London Blue and White Finalists!!! Congratulations to the A8 team on a great tournament. Everyone played well, and it was a terrific team effort.
{ "redpajama_set_name": "RedPajamaC4" }
drop if exists test_class; create class test_class ( col1 integer, col2 date default '2001-05-05', col3 timestamp default '2001-05-05 08:00:00' on update current_timestamp ); insert into test_class(col1) values(999); insert into test_class(col1) values(888); select * from test_class order by 1,2; select attr_name, class_name, default_value from db_attribute where class_name = 'test_class' order by 1,2; alter class test_class modify column col2 date default '2001-05-05' on update current_timestamp; select attr_name, class_name, default_value from db_attribute where class_name = 'test_class' order by 1,2; drop class test_class;
{ "redpajama_set_name": "RedPajamaGithub" }
Global design and BIM software solutions provider Vectorworks, Inc. announces the 2019 release of Vectorworks Architect, Landmark, Spotlight, Fundamentals and Designer, as well as BraceworksTM and Vision. With a focus on increasing design efficiency through overall performance and quality, this new release offers innovations and enhancements to significantly improve the 3D and BIM modeling, 2D documentation and presentation workflows for designers in the architecture, landscape, entertainment and interior design industries. Users of all Vectorworks products will enjoy significantly faster workflows and improved software performance thanks to multiple core support in the Vectorworks Graphics Module, new layer and class search and filter options, and image effects. Vectorworks Architect and Landmark customers will experience improved BIM capabilities, including 3D site model sculpting; the unique ability to have BIM objects display with varying levels of detail in plan, elevation and section drawings; enhanced openBIM interoperability; and a new partnership integration with AutoTURN online for analyzing vehicle swept paths. Vectorworks Spotlight users will enjoy support of the new My Virtual Rig (MVR) import and export file format, as well as enhancements to 3D modeling with Spotlight tools and commands. Braceworks users will benefit from support for bridle analysis. And users of Vision will discover an improved user interface and up to 7x faster performance of the previz application. To learn more about the release of Vectorworks 2019, please visit vectorworks.net/2019. About Vectorworks. Vectorworks first began under another name—Graphsoft—and was founded by Richard Diehl in 1985. Working on the new Mac, their first program was named MiniCAD. Due to the similarity to the company Graphisoft—which was also developing CAD on Macs—Diehl changed the name to Diehl Graphsoft. The company would undergo one final name change in the late 1990s with the move to Windows, when it became Vectorworks. Newly christened Vectorworks was soon acquired by parent company Nemetschek of Germany in 2000. It was the first US-based subsidiary of Nemetschek, joining the company's network of over 40 branches throughout Europe. Vectorworks has since boasted of creating one of the first CAD programs and the first cross-platform CAD application. While they started out predominantly targeting architects, Vectorworks soon moved towards more industry-focused products. The success of this is noted in the 650,000 or more designers currently relying on Vectorworks technology. While Vectorworks might be a minority in the general CAD market, it is a pioneer in the world of BIM. In fact, it stands as the leading BIM application in the UK. Vectorworks is one of the only products that currently combines a BIM model with GIS and urban planning information. It targets a variety of industries including architecture, entertainment, lighting, rendering and landscape. Though less well known than major players such as Autodesk or Dassault SystГЁmes, Vectorworks is undoubtedly a leading developer in the CAD and BIM sectors. About Vectorworks, Inc. Vectorworks, Inc. is a global design and BIM solutions provider serving over 650,000 professionals in the architecture, landscape and entertainment industries. Since 1985, we've been committed to helping designers capture inspiration, nurture innovation, communicate effectively and bring their visions to life. With our cross-platform software, designers can build data-rich, visual models without sacrificing the design process, while collaborating efficiently throughout the project life-cycle. Headquartered in Columbia, Maryland, with offices in Atlanta, Georgia, Newbury, England and London, England, Vectorworks is a part of the Nemetschek Group.
{ "redpajama_set_name": "RedPajamaC4" }
Home » Events » 2014 Miss Earth Candidates visiting Yoshinoya restaurants Cuore: A Bistro and a Lounge in one It's Red Iced Tea Day on September 1 Tokyo Tokyo unveils new Store Design, Dessert Bar and Latest Ramen Flavors Heavenly goodness food trip and more at Sky Ranch 2014 Miss Earth Candidates visiting Yoshinoya restaurants Posted by TheNewsGuy on Nov 25, 2014 in Events | 0 comments Yoshinoya, the the country's most popular fast-food chain that specializes in all-time favorite Japanese culinary fare, welcomed the candidates of 2014 Miss Earth beauty contest during a visit to one of its branches in Glorietta, Makati City last November 7. Yoshinoya Century Pacific Inc. President Timothy Yang and the staff of the famous Japanese restaurant led in welcoming the international beauty queens who arrived early for the earth-driven pageant now on its 14th year. "I would like to welcome all the Miss Earth candidates in Yoshinoya. I'm glad that they did not pick me as one of the judges for the pageant because all of you are deserving of the Miss Earth title. It would have driven me nuts," said Yang to the delegates. He added that this is the third time that the fast-food chain gave a welcome dinner to the candidates of the beauty contest. Among the early arrivals were representatives from Austria, Colombia, Dominican Republic, Ecuador, Egypt, Fiji, Myanmar, Samoa, South Africa, Switzerland, Tonga, USA, and Zambia. After dinner, the beauty queens also enjoyed a parlor game dubbed "Dressed Me The Yoshinoya Way" to the delight of customers and special guests. Later, heads turned as the beauty queens posed for souvenir photos with customers and guests in front of the popular store. The new Miss Earth will be crowned at the newly-refurbished UP Theater in Diliman, Quezon City on November 29. But before that, another batch of Miss Earth beauties will visit another branch of Yoshinoya restaurant in the city. So get your cameras ready and have your photos taken with your favorite Miss Earth beauty queens soon. You can also visit the Yoshinoya Facebook page (www.Facebook.com/YoshinoyaPhilippines) or follow Yoshinoya Instagram or Twitter accounts, or you can go to www.yoshinoya.ph. Free Updates! Enter your email address to get FREE updates: Thank you. Kindly check your email to verify subscription. Add The NewsMakers Click and Discover
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
static inline __m128i rsp_vsub(__m128i vs, __m128i vt, __m128i carry, __m128i *acc_lo) { __m128i unsat_diff, sat_diff, overflow, vd; // acc_lo uses saturated arithmetic. unsat_diff = _mm_sub_epi16(vt, carry); sat_diff = _mm_subs_epi16(vt, carry); *acc_lo = _mm_sub_epi16(vs, unsat_diff); vd = _mm_subs_epi16(vs, sat_diff); // VD is the signed diff of the two sources and the carry. Since we // have to saturate the diff of all three, we have to be clever. overflow = _mm_cmpgt_epi16(sat_diff, unsat_diff); return _mm_adds_epi16(vd, overflow); }
{ "redpajama_set_name": "RedPajamaGithub" }
Kern County Sheriffs Department Sheriff's aide arrested at Lerdo Last updated 4/18/2020 at 4:48pm | View PDF A sheriff's aide at the Lerdo Pre-Trial Facility was arrested following an investigation of suspected contraband distribution. Thirteen inmates also face charges, the Kern County Sheriff's Office reported. Sheriff's aide Erik Belmontes was arrested on suspicion of unauthorized communication with an inmate, bringing a controlled drug into a jail, bringing a cell phone into a jail, possession of a controlled drug for the purpose of sales, conspiracy to commit a felony and participation in a criminal street gang. Belmontes was booked into the KCSO's Central Receiving Facility with a bail of $110,000 and placed on administrative leave, pending disciplinary proceedings, the KCSO reported. Lerdo Pre-Trial Facility inmates Gary Pierson, 39, and Deshaun Nicholson, 30, are suspected to be co-conspirators and face the same charges. Both inmates were also found to be participants in a criminal street gang. Eleven other inmates were arrested and charged with additional crimes committed in custody relating to suspicion of cell phones, illegal drugs and jail-made weapons, according to the KCSO. The investigation began March 9 after detention deputies found illegal contraband. Additional contraband was then discovered by narcotics units. The investigation is ongoing. Anyone with information is urged to contact the KCSO at 661-861-3110. Traffic stop leads to weapons, arrest Arrest Report - Jan. 5, 2023 Wasco welcomes new leadership Shafter celebrates historic football season with downtown rally Program makes impact on children of migrant farmworkers
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
/** * Created by CristoH on 24/04/2016. */ Meteor.publishComposite('postsUserFollowing', function(userFollowing, limit) { return { find: function() { if (userFollowing) { return Posts.find({ userId: { $in: userFollowing } }, {sort:{createdAt: -1},limit: limit}); }else{ this.ready(); } }, children: [ { find: function(post) { return Meteor.users.find({_id: post.userId}, {fields: { profile:1, username:1, followers:1, followersCount:1, following:1, followingCount:1, postsCount: 1 }}); } } ] }; });
{ "redpajama_set_name": "RedPajamaGithub" }
The Ford Falcon is one of the twin staples of the hugely popular Australian V8 Supercar Series. Together with arch rival Holden Commodores, the Ford Falcons contest what many believe to be the world's most competitive and compelling sedan championship. The series is contested on the road courses and street circuits of Australia and New Zealand and — with events in Bahrain and China — elsewhere around the world. The annual Bathurst 1000, staged on an awesome Mt. Panorama circuit that is part country road, part permanent road course, rivals Daytona, Indianapolis, Le Mans and Monaco as one of the great spectacles in motorsports. Like the Commodore, the Falcon is built to strict regulations which seek to balance technical competition and speed with reasonable costs. Thus the Falcon is based on a current specification FG Falcon production bodyshell complete with spoilers, wings, side-skirts and a front splitter, along with a sturdy roll cage. The car is a front-engine, rear-wheel-drive design and features a five-liter "Boss 302" SVO capable of producing 620 – 650 brake horsepower. The engine is a push rod, two valve design equipped with electronic fuel injection and electronically limited to 7,500 RPM. As required by series rules, the Falcon utilizes a double-wishbone front suspension and a live rear axle with four longitudinal links and a Watt's linkage for lateral positioning. The Falcon sports front and rear (steel) disc brakes and an Australian-made six speed Hollinger gearbox.
{ "redpajama_set_name": "RedPajamaC4" }
303 F. 2d 182 - Hardcastle v. Western Greyhound Lines D L J 303 F2d 182 Hardcastle v. Western Greyhound Lines D L J Arvil R. HARDCASTLE, Vernon E. Clary, Lawrence J. Starkel, James H. Kreider, Robert D. Mock, on their own behalf and on behalf of others similarly situated, Appellants, WESTERN GREYHOUND LINES (DIVISION OF THE GREYHOUND CORPORATION), a corporation, D. L. Rhodes, as an individual in a representative capacity, J. Adornetto, as an individual in a representative capacity, Dan Banta, as an individual in a representative capacity, Appellees. United States Court of Appeals Ninth Circuit. Rehearing Denied June 18, 1962. Darwin, Rosenthal & Leff, Irwin Leff, San Francisco, Cal., for appellant. Neyhart & Grodin, Joseph R. Grodin, San Francisco, Cal., for appellees Rhodes and others. Brobeck, Phleger & Harrison, Marion B. Plant, San Francisco, Cal., for appellee Western Greyhound Lines. Before HAMLIN, KOELSCH and DUNIWAY, Circuit Judges. HAMLIN, Circuit Judge. The appellants are all bus driver employees of Western Greyhound Lines which operates bus lines throughout eleven western states. They brought an action against Western Greyhound Lines and others in the United States District Court for the Northern District of California, Southern Division, for declaratory relief and an injunction alleging that they were unlawfully deprived of certain seniority rights. Appellees moved to dismiss the appellants' complaint for failure to state a claim upon which relief could be granted. Thereafter the parties presented certain documents to the court and certain stipulations of fact were made. The appellants were asked to and did make an offer of proof before the district court. The parties have agreed that the motion before the district court should be considered as a motion for summary judgment. After consideration the motion was granted and this appeal followed. We have jurisdiction under the provisions of 28 U.S.C.A. § 1291. The stipulation of fact entered into by the parties shows that prior to June 1, 1957, Greyhound Corporation, a Delaware Corporation, was carrying on certain common carrier activities in the northwestern part of the United States under the name Northwest Greyhound Lines, and other common carrier activities were being conducted under the name Northland Greyhound Lines. Also prior to June 1, 1957, Pacific Greyhound Lines, a California corporation, was engaged in the common carrier business in other portions of the western United States. On June 1, 1957, Pacific Greyhound Lines was merged with Greyhound Corporation and the latter corporation survived the merger. Concurrently with the merger a division of the Greyhound Corporation was established under the name Western Greyhound Lines which division incorporated the former territories serviced by Pacific, Northwest and Northland Greyhound Lines. Prior to the formation of Western Greyhound Lines on June 1, 1957, the employees in the territory occupied by Western Greyhound Lines were represented for collective bargaining purposes by one or another of several locals or divisions of the Amalgamated Street, Electric Railway, and Motor Coach Employees of America. Prior to and at the time Western Greyhound Lines was formed the various locals and divisions had collective bargaining agreements which provided for divisional seniority rights. Divisional seniority is a system of seniority whereby the operations of an employer are divided into divisions and whereby an employee hired into a particular division has seniority within his divisions over all other employees in all divisions except those employees who were hired into his particular division before him. An alternative to divisional seniority is system seniority, which means that an employee is senior only to other employees in the entire system who were hired after him. That is, any employee hired before him anywhere in the entire system would have seniority over him. On January 10, 1958, the above mentioned locals and divisions of the Amalgamated Association formed the Council of Western Greyhound Amalgamated Divisions (referred to herein as the Council) which was formed for the purpose of representing all the employees of Western Greyhound Lines. Various collective bargaining agreements were entered into by Western Greyhound Lines and the Council. One agreement which was dated May 28, 1959, superseded prior agreements with respect to seniority rights. It provided that only employees hired before June 1, 1957, would be entitled to retain divisional seniority rights and that all employees hired subsequent to June 1, 1957, would have only system seniority rights. The appellant bus drivers in this case are all persons who were employed by Western Greyhound Lines between June 1, 1957, and May 28, 1959. The appellants in their complaint alleged that the adoption of system seniority on May 28, 1959, insofar as it operated retroactively to June 1, 1957, "arbitrarily, unfairly and capriciously" took away valuable divisional seniority acquired by the appellants between June 1, 1957, and May 28, 1959, the date when the contract providing for system seniority was executed. The appellants alleged that they were "discriminated against" and that the action was "unreasonable". No contention was made by appellants that the retention of seniority for employees hired before June 1, 1957, was invalid or that the adoption of system seniority for employees hired after May 28, 1959, was invalid. We have concluded that the motion to dismiss appellants' complaint treated as a motion for summary judgment was properly granted. In Steele v. Louisville & N. R. Co., 323 U.S. 192, 65 S.Ct. 226, 89 L.Ed. 173 (1944), a case arising under the Railway Labor Act, 45 U.S.C.A. § 151 et seq., the Supreme Court held that a union which purports to represent its entire membership must not engage in "hostile discrimination" against some members, but must attempt to represent all fairly, impartially and in good faith. In Steele certain Negro railroad firemen were minority members of a union which discriminated against the Negro members on the basis of race and which union entered into agreements and adopted rules whereby Negroes would ultimately be excluded from the union and from working as railroad firemen. The complaint alleged facts in detail which on their face showed discrimination on account of race.1 Subsequent to Steele, hostile discrimination by a union against some of its members has been interpreted to be conduct which is proscribed by the National Labor Relations Act, as amended, 29 U.S. C.A. § 151 et seq., just as the proscription existed with respect to the Railway Labor Act. Ford Motor Co. v. Huffman, 345 U.S. 330, 73 S.Ct. 681, 97 L.Ed. 1048 (1953).2 Moreover, cases subsequent to Steele firmly established that hostile discrimination of any kind is prohibited and that the prohibition is not limited to discrimination on account of race. E. g., Ford Motor Co. v. Huffman, supra; Ferro v. Railway Express Agency, Inc., 296 F. 2d 847 (2d Cir. 1961); Mount v. Grand International Brotherhood of Locomotive Engineers, 226 F.2d 604 (6th Cir. 1955). Some of the general principles pertaining to collective bargaining and hostile discrimination have been stated by the Supreme Court, in Ford Motor Co. v. Huffman, supra, in the following manner: "[T]he * * * purposes [of the National Labor Relations Act] are broad enough to cover terms of seniority. * * * That the authority of bargaining representatives * * * is not absolute is recognized in Steele v. Louisville & N. R. Co., 323 U.S. 192, 198-199 [65 S.Ct. 226, 89 L.Ed. 173] * * *. Their statutory obligation to represent all members of an appropriate unit requires them to make an honest effort to serve the interests of all those members, without hostility to any. [Citations omitted.] "Any authority to negotiate derives its principal strength from a delegation to the negotiators of a discretion to make such concessions and accept such advantages as, in the light of all relevant considerations, they believe will best serve the interests of the parties represented. A major responsibility of negotiators is to weigh the relative advantages and disadvantages of different proposals. * * * Inevitably differences arise in the manner and degree to which the terms of any negotiated agreement affect individual employees and classes of employees. The mere existence of such differences does not make them invalid. The complete satisfaction of all who are represented is hardly to be expected. A wide range of reasonableness must be allowed a statutory bargaining representative in serving the unit it represents, subject always to complete good faith and honesty of purpose in the exercise of its discretion."3 An essential element, then, necessary to raise a limitation upon a union's discretion in bargaining with respect to seniority rights is a bad faith motive, an intent to hostilely discriminate against a portion of the union's membership. This element has been present in cases decided subsequent to Ford Motor Co. v. Huffman, supra, such as Ferro v. Railway Express Agency, Inc., supra,4 Mount v. Grand International Brotherhood of Locomotive Engineers, supra,5 and Colbert v. Brotherhood of Railway Trainmen, 206 F.2d 9 (9th Cir. 1953).6 The complaint in the instant case did not contain any allegation that the adoption of systemwide seniority on June 1, 1957, rather than on May 28, 1959, when the contract was executed, was the result of hostile discrimination against the appellants. The complaint nowhere alleges that the union representatives had a bad faith motive, intent or purpose in selecting June 1, 1957, rather than May 28, 1959. The complaint herein alleged that the adoption of system seniority as to the appellants was "arbitrary", "capricious" and "unreasonable." In Colbert v. Brotherhood of Railway Trainmen, supra, this court held that similar conclusory words ("arbitrary", "capricious" and "fraudulent") without a concomitant showing of a lack of good faith did not set forth a claim.7 Dismissal of the complaint was affirmed. In view of the fact that this case is being treated as an appeal from the granting of a motion for summary judgment, it is unnecessary for us to decide whether, in the light of Colbert and the later case of Conley v. Gibson, 355 U.S. 41, 78 S.Ct. 99, 2 L.Ed.2d 80 (1957), appellants' complaint failed initially to set forth a claim upon which relief could be granted. Nowhere in the material outside the complaint which was examined by the district court do facts or allegations appear which show or tend to show any improper motive or purposeful discrimination.8 The entire record before this court — the complaint, stipulations, offer of proof and affidavits — does nothing more than establish that there is a difference of opinion between portions of the union membership. It is admitted that the proposals for changing seniority were submitted to the union membership and passed upon favorably by a majority thereof. As stated in Ford Motor Co. v. Huffman, supra, "Inevitably differences arise in the manner and degree to which the terms of any negotiated agreement affect individual employees and classes of employees. The mere existence of such differences does not make them invalid. The complete satisfaction of all who are represented is hardly to be expected." [Emphasis added.]9 The appellants herein have done nothing more than present facts showing dissatisfaction with a result adopted by a majority of the union of which the appellants are members. That portions of an electorate will be dissatisfied with the result of an election is a fact inherent in the democratic process and the principle of majority rule. The appellants in their brief on appeal state the general principle within which they seek to come in the following manner: "The political strength or weakness of a group is not a proper basis for discrimination as between groups of employees. That is, a modification of seniority which favors a majority group over a minority and has no other rational basis would fail to meet the test of fairness required by a union in representing its members."10 The stipulated facts before this court amply demonstrate that there was a "rational basis" upon which to select June 1, 1957, as the date for beginning system seniority. On June 1, 1957, the merger between Greyhound Corporation and Pacific Greyhound Lines took place. As a result Western Greyhound Lines (as a division of Greyhound Corporation) came into existence operating in the territory formerly occupied by Pacific, Northwest and Northland Greyhound Lines. June 1, 1957, was the first time when all the employees in this territory were employed by a single employer. The date for creating system seniority was the same date when the system itself was created. Moreover, after the creation of Western Greyhound Lines the employees from January 10, 1958, were represented for collective bargaining purposes by a single entity, the Council, whereas before that time the employees were represented by several locals or divisions. Thus, employees hired before the creation of the single system were not affected by the change in seniority; those hired after the system was created had seniority on a systemwide basis. It thus appears to us that the stipulated facts conclusively illustrate the presence of the "rational basis" which appellants contend is necessary. We are not unaware of the rule that summary judgment is not to be granted unless no genuine issue as to any material fact is presented to the court.11 However, we are of the opinion that appellants have not met the required standard. No genuine issue of material fact is presented by the record in this case. There are no allegations of bad faith or purposeful discrimination against appellants. Nor are there any facts alleged from which we can infer the possible presence of a bad faith motive in selecting June 1, 1957, as the date for starting system seniority. Furthermore, appellants offered no facts in their offer of proof from which the presence of hostile discrimination could be detected by inference or otherwise. On the other hand, undisputed facts do appear in the stipulation of facts entered into by the parties which show that in fact there was a rational basis upon which to select June 1, 1957. Collective bargaining representatives have broad discretion to bargain with respect to seniority rights and this discretion should not be interfered with in the absence of some showing that a change in seniority rights resulted from hostile discrimination. See also Tunstall v. Brotherhood of Locomotive Firemen & Engineermen, 323 U.S. 210, 65 S.Ct. 235, 89 L.Ed. 187 (1944) See also Wallace Corp. v. N. L. R. B., 323 U.S. 248, 255, 65 S.Ct. 238, 89 L.Ed. 216 (1944) 345 U.S. at 337-338, 73 S.Ct. at 686 In Ferro a union had an agreement with Railway Express Agency providing for separate seniority districts. There were provisions for transfer of employees from one district to another. When railroad traffic decreased at one terminal due to re-routing, a dispute arose between the union and the employer as to whether men could be transferred from the terminal where work decreased to a terminal where work increased due to the re-routing. A special agreement resulted from negotiations between the union and the employer which provided for the transfer of 65 men. Those not transferred would remain on furlough. These latter persons brought an action against the union and the employer claiming that as members of one local they had been discriminated against in favor of members of another local of their union. Although the complaint broadly alleged that the defendants "have in a willful and malicious manner discriminated against plaintiff in favor of members" of another local, it appeared that plaintiffs relied on the fact that the union in signing the complained of agreement "was motivated by a desire to discriminate against them" (296 F.2d at 850). In addition the affidavit of the plaintiff filed in opposition to a motion for summary judgment stated that the "purpose" of entering into the agreement was "to discriminate against members of a politically weak local * * * in favor of the politically stronger local" (296 F.2d at 851). The court held that a cause of action had been stated within the doctrine of the Steele case In Mount collective bargaining agreements provided for divisional seniority. Two divisions — No. 666 and No. 444 — had certain geographical boundaries under which they had been operating for 48 years. No. 444 repeatedly attempted to have the boundaries changed more favorably to it. A referendum was held which sustained the position of No. 666. Within the processes provided by the Union the validity of the referendum was sustained against attacks by No. 444. When the matter was referred to a committee of the union an amendment changing the geographical boundaries was proposed which would have been favorable to No. 444 notwithstanding the referendum. A complaint of No. 666 members claimed that the amendment would discriminate against them unfairly. The court sustained the complaint, saying that a cause of action would exist if the union was "engaging in hostile discrimination against a portion of the membership of the craft,without a good faith representation of the entire membership." (226 F.2d at 607). [Emphasis added.] The complaint contained a complete statement of the history of the controversy. In Colbert, a case factually very similar to this case, the complaint of some employees alleged that a certain agreement between their union and employer providing for a change from divisional seniority to system seniority was "arbitrary, capricious and fraudulent" since it was made retroactively effective. In Colbert as in this case only those employees hired during the period between retroactive application of the agreement and the signing of it were adversely affected by the change. These bare allegations were held inadequate to show a cause of action under the doctrine announced in the Steele and Ford Motor Co. v. Huffman cases, supra 206 F.2d at 12 At the hearing on the motion to dismiss (ne summary judgment) before the district court the following proceedings took place: "The Court: What would be your offer of proof? "Mr. Darwin: Our offer of proof would show through witnesses that individuals, men, operators, drivers, when they signed into the divisions on the date of employment were given, at their request and at the explanation of employer representatives as well as members of their respective divisions or, as is sometimes called `locals,' they were told that the specific division into which they were employed would be retained by them throughout their employment if they so desired. It would show by proof that some of the men undertook runs for years — and when I say years I mean two and three years in some instances — of a less desirable nature in order to work themselves up into a position of seniority within the division to make it possible for them to then obtain a more desirable run. It would show that some of the men are still so employed and but for the requirement that they select — selection is the word under this stipulation — by April 15 make a selection of other runs they would not have been prejudiced except for this stipulation. "* * * We are not addressing ourselves to the question of internal affairs and remedies within an organization except to indicate, as we have said in our Complaint, which will be a matter of proof, that we tried within those internal regulations and rules to get relief which we have not been able to, and that is why we are here. But that is not the gravamen of our Complaint in Court, your Honor. The complaint sets up ultimate facts. We would show following those ultimate allegations by proof that within the decisions which have been in some instances cited by both sides, capricious, arbitrary action has been taken over what would on the surface seem to be the facade of collective agreements and bargaining." It is evident that no facts indicating or tending to indicate any hostile discrimination or bad faith were offered. We do not imply that making such assertions in an offer of proof would in and of itself have been sufficient to warrant a denial of summary judgment. 345 U.S. at 338, 73 S.Ct. at 686. See text accompanying note 3 supra Appellants relied on the Ferro case, note 4 supra, as authority for the quoted proposition. However, the facts disclosed by the record in this case do not show that there was any discriminatory action in favor of one politically stronger local or faction of the union against a politically weaker local or faction. Reliance upon Ferro in this case is misplaced See Fed.R.Civ.P. 56(c). See also Fed.R.Civ.P. 12(c), 28 U.S.C.A
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
What to stream: 'The Crown' and Dolly Parton on Netflix, 'Booksmart' on Hulu, more holiday programming !Featured, Amazon Prime, BritBox, Criterion Channel, HBO Now, historical, Hulu, Netflix, Streaming TV, Sundance Now, What to Stream 11/22/201911/22/2019 Sean Axmaker Here's what's new and ready to stream now on Netflix, Amazon Prime, Hulu, HBO Now, video-on-demand, and other streaming services … The weekly column is featured in The Seattle Times, The Oregonian, The Spokesman-Review, and other newspapers. Oscar-winning actress Olivia Colman takes over the role of Queen Elizabeth II and Tobias Menzies is Prince Philip in the third season of the lavish historical Netflix drama "The Crown." This season follows the Royal Family through the tumultuous 1960s and up the Silver Jubilee with episodes focusing on the drama behind key historical moments. Helena Bonham Carter brings the train wreck that is Princess Margaret to a new level of sardonic chaos. 10 episodes streaming on Netflix. Kaitlyn Dever and Beanie Feldstein play overachieving students who throw caution to the wind on the last night of high school in "Booksmart" (2019, R). Actress Olivia Wilder makes a sure directorial debut with this raunchy and smart buddy comedy. Streaming on Hulu. The music of Bruce Springsteen crosses the Atlantic in "Blinded By the Light" (2019, PG-13), a rousing high school drama of identity and the creative spirit, based on the true story of a first generation Pakistani-Briton in a small factory town in 1980s England. Gurinder Chadha directs this energetic tale of the power of art. On Cable on Demand and VOD, also on DVD and at Redbox. The Netflix Original anthology series "Dolly Parton's Heartstrings: Season 1" dramatizes the stories behind the singer/songwriter's iconic songs. Ginnifer Goodwin, Kathleen Turner, Melissa Leo, and Julianne Hough are among the guest stars and Parton appears in three episodes. 8 episodes on Netflix. Holiday trimmings: Vanessa Hudgens stars in the Netflix Original film "The Knight Before Christmas" (2019, not rated), a seasonal romance with time-traveling medieval knight (Josh Whitehouse), and "Nailed It! Holiday!: Season 2" spotlights more baking successes and disasters. Amazon Prime Video presents the animated "Costume Quest: Christmas Special" and the Muppet TV specials "Emmet Otter's Jug Band Christmas" (1977) and "The Christmas Toy" (1986) from Jim Henson. Classic pick: Henry Fonda takes a rare role as a cold-blooded killer in "Once Upon a Time in the West" (1968, PG-13), Sergio Leone's epic tribute to the American western, shot in part against the primal landscape of Monument Valley. Claudia Cardinale, Charles Bronson, and Jason Robards star. On Netflix and Amazon Prime Video. Pay-Per-View / Video-On-Demand "Dora and the Lost City of Gold" (2019, PG) brings the animated kid series to the big screen for a family-friendly live-action adventure. Available same day as select theaters nationwide is the crime thriller "The Courier" (2019, R) with Gary Oldman as a crime boss and Olga Kurylenko as his assassin. "Suffragette" (2015, PG-13) dramatizes the violent struggle for women's voting rights in Britain in the early 20th century. Carey Mulligan and Helena Bonham Carter star with Meryl Streep. Ryan Gosling is an enigmatic getaway driver in the sleek crime thriller "Drive" (2011, R), co-starring Carey Mulligan and Albert Brooks. True stories: "Bikram: Yogi, Guru, Predator" (2019, not rated) profiles Bikram Choudhury, the founder of hot yoga, from celebrity to accused sexual predator and "Lorena, Light-Footed Woman" (Mexico, 2019, not rated, with subtitles) introduces audiences to the ultramarathon runner who competes in sandals. International affairs: a teenage boy is arrested dropped into a brutal custody center in "Brother (Mon frère) (France, 2019, not rated, with subtitles), which direct to Netflix from French cinemas. International TV: two high school boys are invested with supernatural powers in "Mortel: Season 1" (France, with subtitles), a mix of teen crime drama and fantasy adventure. Comedy "Nobody's Looking: Season 1" (Brazil, with subtitles) also delves into fantasy with its irreverent tale of a fledgling guardian angel. More international TV: reality series "Singapore Social: Season 1" (Singapore); teen drama "Candy Online: Season 1" (Taiwan, with subtitles); reality fashion series "No Time for Shame: Season 1"(Argentina, with subtitles); "High Seas: Season 2" (Spain, with subtitles). Kid stuff: the animated series "Dino Girl Gauko: Season 1" (Japan) follows a middle school girl who transforms into a dinosaur when she loses her temper. Also new: "The Dragon Prince: Season 3"; "Trolls: The Beat Goes On!: Season 8." Stand-up: "Iliza: Unveiled" (2019, not rated) presents Iliza Shlesinger dishing on her wedding. While Disney+ has become the new home for the Marvel Cinematic Universe, they don't yet have lock on all of them. The first "Thor" (2011, PG-13) with Chris Hemsworth and Anthony Hopkins, the World War II-era "Captain America: The First Avenger" (2011, PG-13) with Chris Evans, and "The Avengers" (2012, PG-13), which brought all of the major Marvel heroes together for the first time, are available to Amazon Prime subscribers. Joe Mantegna is an ex-con returning home to his Bronx neighborhood in the sentimental drama "Bottom of the 9th" (2019, R). True stories: "Artifishal" (2019, not rated) looks at the unintended harm of fish farming on wild salmon. International affairs: Penelope Cruz plays a Spanish actress returning home from a Hollywood career to play "The Queen of Spain" (Spain, 2017, not rated, with subtitles) in this comedy. Billy Wilder directs Jack Lemmon in the comedies "Irma La Douce" (1963), costarring Shirley Maclaine as a streetwalker in turn-of-the-century Paris, and "Avanti!" (1972, R), a collision of midlife crisis, witty adult romance, and sex farce costarring Juliet Mills. Clark Gable and Burt Lancaster clash in "Run Silent, Run Deep" (1958), a terrific World War II submarine drama of tactical gamesmanship punctuated with war movie action. Robert Ryan and Burl Ives star in "Day of the Outlaw" (1959), a western set in a snowbound mountain town under siege from outlaws. More westerns: Burt Lancaster stars in "The Scalphunters" (1968); Kirk Douglas in "The Indian Fighter" (1955). Gemma Arterton is socialite Vita Sackville-West and Elizabeth Debicki plays author Virginia Woolf in the romantic drama "Vita & Virginia" (2019, not rated). True stories: "Margaret Atwood: A Word after a Word after a Word is Power" (2019, not rated) presents the Canadian author discussing her life and work and "The Quiet One" (2019, not rated) profiles Bill Wyman, a founding member of the Rolling Stones who left the group in 1990. Streaming TV: The reverberation of a tragic accident threatens to tear apart a small Welsh community as grief turns to anger and blame in "The Accident," a limited series from writer Jack Thorne ("National Treasure" and the HBO series "His Dark Materials") starring Sarah Lancashire and Sidse Babett Knudsen. It makes its US debut along with the BBC limited series "Apple Tree Yard" (2017, TV-MA) with Emily Watson and Ben Chaplin. Kid stuff: family drama "Holly Hobbie: Season 2" (TV-PG) continues the adventures of a 13-year-old girl (Ruby Jay) in a small Midwest town. A bullying CEO (Regina Hall) wakes up as her young self in "Little" (2019, PG-13), a comedy costarring Issa Rae and Marsai Martin. The fiftieth season of "Sesame Street" is now underway with new episodes Saturday mornings. True stories" "Ernie & Joe: Crisis Cops" (2019, TV-MA) follows two members of the San Antonio Police Department's new mental health unit. Available Saturday night is "Us" (2019, R), Jordan Peele's nightmarish follow-up to "Get Out." In anticipation of "63 Up," the ninth installment in the ambitious documentary project carried on by Michael Apted, BritBox presents the previous installment "56 Up" (2012) and the new documentary "7 Up and Me" (2019). Also new on BritBox is "Bill" (2015, PG), a comic take on the life of William Shakespeare starring Damian Lewis and Helen McCrory. "An Elephant Sitting Still" (China, 2018, not rated, with subtitles), an epic four-hour drama following the intersecting lives of four people over a single day in a bleak Chinese city, won top awards at film festivals around the world. It makes its streaming debut on Criterion Channel, along with director Hu Bo's 2017 short film "Man in the Well." Also new on Criterion Channel are films by Italian filmmaker Alice Rohrwacher ("Corpo celeste," 2011, and "The Wonders," 2014) and Norwegian director Joachim Trier ("Reprise," 2006, and "Oslo, August 31st," 2011), and the amazing Koker Trilogy from Iranian auteur Abbas Kiarostami ("Where is the Friend's House?," 1987, "And Life Goes On," 1992, and "Through the Olive Trees," 1994). All with subtitles. A university professor (Katherine Kelly) locks wits with an angry, disaffected student (Molly Windsor) "Cheat" (2019), a British limited series thriller set in the halls of academia. First episode available, new episodes each Thursday. OvidTV This streaming service, a partnership of small but vital independent distributors, remains devoted to documentaries and independent and foreign language films and has been steadily building a robust library. A few highlights among its recent arrivals include Kelly Reichardt's "Wendy and Lucy" (2008, R) with Michelle Williams, the comedy "Return of the Hero" (France, 2018, with subtitles) starring Jean Dujardin and Melanie Laurent, Andrea Arnold's unconventional adaptation of "Wuthering Heights" (2011, not rated), Pedro Costa's second feature "Casa de Lava" (Portugal, 1994, with subtitles) starring Isaach de Bankole, and Jules Dassin's hot-blooded "The Law" (Italy, 1959) with Gina Lollobrigida, Marcello Mastroianni, and Yves Montand. May I also recommend the documentary "A Film Unfinished" (Germany, 2010, not rated, with subtitles), a powerful look into the reality of the Warsaw ghettos using footage from an abandoned Nazi propaganda film. It's chilling and compelling. Don't miss a single recommendation. Subscribe to Stream On Demand to receive notifications of new posts (your E-mail address will not be shared) and follow us on Facebook and Twitter. Amazon Prime, Blinded by the Light, Booksmart, BritBox, Criterion Channel, HBO Go, HBO Now, Hulu, Netflix, OvidTV, Sundance Now, The Crown: Season 2, VOD What to stream: Disney+ launches with Marvel movies, the 'Star Wars' franchise, and Disney classics 'Witness for the Prosecution' with Charles Laughton and Marlene Dietrich on Amazon Prime Video Sean Axmaker https://streamondemandathome.com Sean Axmaker is a Seattle film critic and writer. He writes the weekly newspaper column Stream On Demand and the companion website, and his work appears at RogerEbert.com, Turner Classic Movies online, The Film Noir Foundation, and Parallax View. 'Star Trek Beyond' on Amazon Prime and Hulu 'Rare Exports: A Christmas Tale' on Prime Video, Hulu, Shudder and more 'The Man from Nowhere' – South Korean vengeance on Amazon Prime Video and Rakuten Viki The definitive 'Pride and Prejudice' on HBO Max and BritBox
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Q: Fixed header while scroll I have the header of a table in the middle of a page, but since the page is huge, I want to fix the header to the top of browser while I scroll down for the page... So my question is: How do I set header to be normal, until the user scrolls down and the top border of header touches the browser border, where it should stay fixed on that position, no matter how much further down the user scrolls? A: Let me explain as to how this could be done. Steps * *Find your table header, and save its position *Add a listener to the window's scroll event. *Check the window scroll against your table header position * *If the position < window scroll - add a class to fix the table header *Else, reset the css to behave like a normal header. I've posted a fiddle that you can find here. Code sample HTML <div class='lots_of_stuff_in_here'> ... </div> <table> <thead id='my_fixable_table_header'> <tr> <th>My awsesome header number 1</th> <th>My awsesome header number 2</th> </tr> </thead> <tbody> <tr> <td>Content</td> <td>Content</td> </tr> // much more content </tbody> </table> Javascript // Just so you get the idea behind the code var myHeader = $('#my_fixable_table_header'); myHeader.data( 'position', myHeader.position() ); $(window).scroll(function(){ var hPos = myHeader.data('position'), scroll = getScroll(); if ( hPos.top < scroll.top ){ myHeader.addClass('fixed'); } else { myHeader.removeClass('fixed'); } }); function getScroll () { var b = document.body; var e = document.documentElement; return { left: parseFloat( window.pageXOffset || b.scrollLeft || e.scrollLeft ), top: parseFloat( window.pageYOffset || b.scrollTop || e.scrollTop ) }; } ​ A: You're looking for a horizontally oriented "sticky box" that follows you down the page as you scroll. Here is a walkthrough that explains how to create this effect for a sidebar: http://css-tricks.com/scrollfollow-sidebar/ I modified the code to work with a generic example that spans the width of the page: HTML: <div class="wrapper"> <div class="head">HEAD</div> <div class="header">Table Header</div> <div class="content">Content</div> <div class="footer">Footer</div> </div>​ CSS: .wrapper { border:1px solid red; } .head{ height: 100px; background: gray; } .header { background:red; height:100px; left:0; right:0; top:0px; margin-top:100px; position:absolute; } .content { background:green; height:1000px; } .footer { background:blue; height:100px; } jQuery: $(function() { var $sidebar = $(".header"), $window = $(window), offset = $sidebar.offset(), topPadding = 0; $window.scroll(function() { if ($window.scrollTop() > offset.top) { $sidebar.stop().animate({ top: $window.scrollTop() - offset.top + topPadding }); } else { $sidebar.stop().animate({ top: 0 }); } }); });​ ​This will animate the header block into view when you scroll beyond where it originally appears. jsFiddle here A: you may try to enclose the bottom elements under the header in one div then add class to that div set overflow to auto A: I hope you are looking like this Header Fix Demo HTML <div class="wrapper"> <div class="header">Header Fix</div> <div class="content">Content</div> <div class="footer">Footer</div> </div> CSS .wrapper { border:1px solid red; } .header { background:red; height:100px; position:fixed; left:0; right:0; top:0; } .content { background:green; height:1000px; } .footer { background:blue; height:100px; } A: for keeping the position fixed of any block element,you need to use the absolute or the fixed property in the display attribute of style,but dont forget to give enough space and break to the top elements otherwise it will go under the header section. A: $(window).scroll(function() { if ($(this).scrollTop() > 100){ $('header').addClass("sticky"); } else{ $('header').removeClass("sticky"); } }); css: header.sticky { font-size: 24px; line-height: 48px; height: 48px; background: #efc47D; text-align: left; padding-left: 20px; } A: Here is a full working version using fixed headers, footers and columns! Apply the classes for position relative, very important, otherwise the fixed column will overlap the header and footer, then define the classes at the table level where needed: "sticky-table"(mandatory), "sticky-header", "sticky-column", "sticky-footer", than call function "applyStickyHeaders". That's all! $(function(){ applyStickyHeaders(); }); Full example: https://jsfiddle.net/pintilies/6zLyxewg/4/ Tested in IE, FireFox and Chrome.
{ "redpajama_set_name": "RedPajamaStackExchange" }
Q: JUnit test on getter method not working I am working on a Java exercise in Eclipse to add JUnit tests to a existing project. This isn't for an assignment or anything, just a way to get used to Eclipse (I had been using BlueJ previously). However, the two test methods I have written don't seem to be working. For some reasons, the Circle objects I have created (which have a radius field, which I have set as 6, 8 and 2 to three different circles) keep defaulting to a radius of 0, so both of my test methods (one does actually report to work, but this is because it is checking the circumference is >= 0) fail. What have I done wrong? I am not an experienced programmer so the mistake may be obvious to most of you. import static org.junit.Assert.*; import org.junit.After; import org.junit.Before; import org.junit.Test; public class CircleTest { Circle circle1; Circle circle2; Circle circle3; @Before public void setUp() throws Exception { circle1 = new Circle(6.00); circle2 = new Circle(8.00); circle3 = new Circle(2.00); } @Test public void testCircumference() { assertTrue(circle1.circumference() >= 0); assertTrue(circle2.circumference() >= 0); assertTrue(circle3.circumference() >= 0); } @Test public void testGetter() { assertEquals(6, circle1.getRadius(), 1e-15); assertEquals(8, circle2.getRadius(), 1e-15); assertEquals(2, circle3.getRadius(), 1e-15); } @After public void tearDown() throws Exception { } } A: More than likely the value returned by getRadius is the default value of 0.0 for double primitive types Ensure the radius is assigned in the constructor of Circle public Circle(double radius) { this.radius = radius; } so that the value can be returned by getRadius public double getRadius() { return radius; } A: Take a look: http://docs.oracle.com/cd/E19957-01/806-3568/ncg_goldberg.html In 2 words: floating points should not be compared by equals - you should compare them by their absolute difference: a - b < 0.00001, for example. I think, it is a root of a problem here. A: I assume that you use dobules or floats for the radius. Working with these types can be tricky, since they are not precise. Unit test frameworks provide special comparison methods for this case: http://junit.sourceforge.net/javadoc/org/junit/Assert.html#assertEquals%28double,%20double,%20double%29 So you would use for example assertEquals(6, circle1.getRadius(), 0.0001); A: The error must be in the Circle class. Your tests, though they have some minor flaws, seem okay. * *Since you are using JUnit 4 annotations, you need not name your @Before method setUp. *You down't need a tearDown method, since it is empty. You also don't need to name it tearDown. *These classes should have but one assert, Were something wrong with circle1, you'll never test circle2 and circle3. In fact, you should look up parameterized JUnit tests. So, what should your Circle class look like? Here's an idea, and some hooks for test writing. public class Circle implements Serializable { private static long serialVersionUid = ...; private final double radius; public Circle(final double radius) throws IllegalArgumentException { if (radius <= 0.0) { throw new IllegalArgumentException("Attempt to create a circle with nonpositive radius" + radius); } this.radius = radius; } public double getRadius() {...} public double getCircumference{...} } Now, test that: * *new Circle(-10.0) throws. *new Circle(Double.NaN) throws, *new Circle(10.0) succeeds. *(new Circle(10.0)).getRadius() returns 10. *(new Circle(10.0)).getCircumference() returns approximately 31.4159. *Circle implements Serializable.
{ "redpajama_set_name": "RedPajamaStackExchange" }
Retailers crushed in rush to attract Christmas shoppers Black Friday backlash could be on the cards Retailers are killing themselves and each other in their attempts to attract early Christmas shoppers on Black Friday, according to a retail expert from London Business School. Elizabetta Camilleri founded SalesGossip in London Business School's Incubator after studying for her MBA at the School. SalesGossip was the first online and mobile service to curate all fashion and beauty promotions online and on the high street, and now it is warning retailers that they are killing themselves and each other in the rush to attract Black Friday shoppers. Ms Camilleri explains: "Last year Black Friday hit UK stores for the first time. 142 retailers on SalesGossip, mainly national chains, had Black Friday or Cyber Monday deals in 2013. But the transatlantic migration of this shopping phenomenon is killing retailers. "The retailers are telling analysts that they will sell more stock full price. But in practice this isn't the way they are incentivising customers. Black Friday is yet another bargain buster in the sales war that is forcing retailers to slash prices. This year, on 28 November, a 50% increase in the number of retailers offering Black Friday promotions is expected. The margins of smaller retailers and independent stores stocking limited pieces from a number of brands are at greatest risk." Even luxury brands which have previously steered clear of discounts for fear of devaluing their brands look set to follow suit. But SalesGossip predicts a Black Friday backlash and is advising retailers to get ahead of the curve, calling time on the transatlantic tide that has quickly become an anchor for early Christmas shoppers. It's a tall order, "but retailers can't afford to keep following the herd", Ms Camilleri says. "In the last month alone 244 retailers on SalesGossip went on sale plus 14 sample sales. Holding a one-off event in a non-sale period, or charging full price when other retailers are on sale, is a more effective way to stand out from the crowd." According to SalesGossip, retailers will also be forced to get more creative with our shopping experience. Offering crèche facilities could also be a boost to retailers' fortunes. For most of us, SalesGossip finds, shopping is at heart still a hobby and women are more drawn to sales than men. While men tend to shop for specific items, women spot the sales first and browse for the best bargains second. And, while research shows that 60% of us browse bargains by mobile phone and tablet, between 80 and 95% of us actually still purchase items in-store. It's a statistic that lends weight to Ms Camilleri's prediction that we are on the cusp of seeing a return to the shopping experience of 20 years ago. One thing is for certain, with 60% of high street leases expiring over the next four years, retail is facing a revolution.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Last week the Great NEWS blog post shared England – The Great and Gross Part 1 and now it is time for Part 2. As you read Part 2 of the article notice the examples and warnings from England to see which ones apply to you and your country. A key benefit from studying health and history together is to learn from the experiences of other cultures. As you enjoy and benefit from my perceptions of England – The Great and Gross look for clues from behaviors and habits which may be helping you or harming you. After many trips to London, England and the United Kingdom (UK) over the last nineteen years and immersion in the culture there are obviously some significant gaps in the health of the country and its people. England is definitely a vibrant cultural, financial and historical center. Like many great cities and countries it has many great and gross issues the communities and people are dealing with. This article will focus on some valuable life lessons learned while traveling to London for business and pleasure which can apply to your health and longevity regardless of where you live or travel currently. Centuries of assimilation and cross pollination from conquest, colonization, cultural exchange, global trade, naval dominance and war has influenced the evolution of England. The focus of this article is to help you learn from the trials and tribulations of England and her people. As you notice the many unhealthy trends in England what valuable lessons will you apply in order to benefit your country and lifestyle? When you look at what markets are selling sell it is fairly obvious the majority of people in England are eating significantly more highly processed and refined foods. The abundance of products made from bleached white wheat flour is a living nightmare for those with eating addictions, disorders, gluten intolerance, high blood sugar or Irritable Bowel Syndrome. The long list of refined flour products includes: biscuits, breads, buns, cakes, cereals, cookies, crackers, crumpets, pancakes, pastries, pasta, pies, pizza, rolls, scones and sweets. Many people are replacing the healthy fats, fruits, greens, nuts, roots, seeds and vegetables with fake foods and fast foods. Burgers, chips (fries), crisps, fried chicken, fried fish, fried foods, pasta, pizza, sandwiches and sodas are now becoming the part of the routine eating pattern. In honor of equitable and fair coverage it is important to start with what is great about a country, culture or community first before discussing what is gross and not yet as great about them. What Gross Problems Does England Face? These are observations during my recent and previous trips to England. Crowds and crowding are an issue in many cities. Poor lifestyle choices and sanitation habits can easily spread bacteria, bugs, fungus and viruses to other people rapidly from contact, contamination, coughing or sneezing in congested places. Cigarette smoking is a major issue in England. Especially worrisome is the number of young people smoking and in particular young women. What is especially disgusting is the habit of throwing those dirty, filthy, germy and nasty butts on the ground. Cycles of long nights in the winter and short days in the summer lead to many people experiencing health issues. Long periods of darkness can lead to depression and long days can lead to sleep deprivation. Researchers know we are tuned into the cycles and rhythms of the lunar, solar and tidal systems. Our circadian rhythms (24 hour internal body cycles) are involved in hormonal imbalances, mood disorders, sleep disturbance, weight gain and a variety of diseases. Constant noise pollution is another real problem in many urban areas of England. Regardless if the noise is from honking, motorcycles, people, planes, sirens, televisions, traffic, trains or trucks it can easily wear on your nerves and cause additional stress. Excess noise at night has been linked to large numbers of people feeling chronically irritable, overly stressed and sleep deprived. Cold, cloudy, drizzly and grey days can easily affect your mood and spirits. When the sun is not visible for extended periods of time the body, mind and spirit seem to feel less enthusiastic and may even begin to feel depressed and moody. The cold weather and lack of sunshine also greatly reduces the body's ability to produce Vitamin D which is essential for happiness and health. Cooked foods make up the vast majority of peoples diet. High temperature cooking (baking, boiling, frying, grilling and roasting) results in most of the nutrients in foods being partially or significantly altered, broken down and destroyed and therefore prevents optimal absorption, assimilation and utilization by the cells. Eating deep fried food is harmful to your health. Chips in England are French fried potatoes cooked at high temperatures. Cooking with vegetable oils such as canola, corn, peanut or soy causes them to break down more rapidly at the high temperatures. These oils are highly processed and refined and then chemically adulterated which causes them to become toxic to the body. Often they become rancid from repeated food contamination and heating. High temperatures destroy the antioxidants, enzymes, minerals, phyto-nutrients, trace elements and vitamins in the foods which are needed for your health and longevity. Crisps are thinly sliced potato fried in oils to make what are often referred to as potato chips. The extremely high temperatures are known to turn foods toxic. Especially concerning are the high levels of acrylamide found in chips. Acrylamide is found in starchy foods baked or fried at high temperatures. It is considered a cancer causing chemical by many health experts. Cheese and other dairy products are consumed in large quantities in England. Unfortunately most of these are pasteurized dairy products which causes molecular deterioration of the milk fat and protein. This makes it much more difficult for the body to process. It creates more of a glue which combined with the white flour forms a plaster of paris like plaque in the colon. Many dairy cows eat unhealthy food and are crowded, mistreated, over milked and unhealthy. Raw dairy and in particular goat or sheep dairy is closer to the composition of human milk and could be more easily assimilated by consumers. Cooked carbohydrates are the main component of most people's diet. They consume excessive breads, biscuits, cakes, cookies, crumpets, crackers, cereal, chips, colas, croissants, flapjacks, oatmeal, pancakes, pastries, pasta, pizza, potatoes, pretzels, rice, scones, sweets and sugar resulting in even more sugar shock to the body and brain. Over-the-counter drug use is on the rise. Chemists and pharmacists are supply over the counter drugs and prescription drugs. At the British Museum there is an exhibit showing how the average person in England consumes over 14,000 pills or tablets during their life time. This information is probably very outdated since I saw the same exhibit in 1993. Chemically altered and highly processed and refined oils such as canola, corn, margarine, peanut, vegetable, safflower and soy oils are harmful to your health and longevity. These oils are replacing the saturated fats (animal fats, butter, coconut, fish, lard and palm oil) which can tolerate higher temperatures generated by cooking without as much damage to their structural integrity. Unsaturated fats and oils break down much more easily as the temperatures increase. Chemicals are over abundant and over used in the majority of business, commercial and home situations. Synthetic products are used in manufacturing products for foods, home, hygiene and personal use which are harmful to your health and longevity. Cars, buses and trucks burning fossil fuels produce excess air pollution. Carbon dioxide, carbon monoxide, diesel particulate and soot harm the buildings and people of England. For those biking, hiking, running and walking in the city this is a real challenge and health risk. As a major global power England seems to be a more minor player in renewable and sustainable energy. The UK is ranked as the world's eighth largest producer of wind power offering a significant opportunity to utilize more of their abundant wind resources. "Cheers" is both a friendly comment and an all to frequent social past time in England. Many people over indulge in alcohols, ales, beers, gin, lagers, pilsners, scotch, spirits, stouts, vodka, wines and whiskeys on an all too frequent basis. At least smoking is no longer allowed in the pubs or public buildings so things are improving. Computers, cell phones, electronic devices and televisions are used excessively and are preventing people from connecting with real humans and sucking the emotional, mental and physical life out of people. The more time people spend on gadgets the less time they typically invest in fitness, learning and life enhancing activities. Communications over load and excessive exposure to Electro Magnetic Frequencies (EMF) and Microwaves are creating additional health and wellness hazards. Excessive caffeine can lead to dehydration. Caffeine over dose from coffee, colas, cappuccino, caffeinated drinks, and teas is a major problem leading to acidity, adrenal overload and dehydration. Chronic dehydration is common for most people in England due to their climate, diets and lack of awareness. Caffeinated drinks, colder weather and lots of processed and salted foods greatly contribute to this issue. Fewer toilets and long commutes also contribute to more people being dehydrated. Now that we have covered England – The Great and Gross Part 2 you may see patterns and warnings for you and your home country. When we look at others objectively we may also be able to become more aware of our own blind spots and dark sides. A big benefit from studying other cultures is to learn from the painful experiences of others and create a better world. Once you understand England – The Great and Gross it is up to you to apply what you have learned to focus on the areas that are helping you instead of robbing you of perfect health and longevity. implementing and sustaining to help you enjoy great nutrition, emotions, wellness and success? Once you have answered the questions enjoy a great English movie theme such as Three Weddings and a Funeral or The Holiday. What comments, commitments or questions do you have regarding unhealthy lifestyle choices you think are gross?
{ "redpajama_set_name": "RedPajamaC4" }
One of the greatest aspects of my career is meeting people from all walks of life. I feel fortunate to have made so many connections in NYC and want to pass on and share all of the great events, concerts, openings and everything else I get to hear about. I've created this page to show support and gratitude to all of my friends and clients and to spread the word. So check it out and enjoy! rooftopfilms.com This is a great way to see independent films all over the city, outdoors. Sometimes even free! www.youtube.com/reservechannel Another one you just gotta check out, got amazing reviews moments after it launched. www.facebook.com/pages/Son-de-Brooklyn/236182550133 Cuban band that plays in my neighborhood sometimes. http://www.facebook.com/BrooklynFashionLeague Some local ladies making some amazing things and teaching classes too! www.hosegator2.net This is my Fathers invention, although New Yorkers may not have a use for it.... your friends and family will love it!
{ "redpajama_set_name": "RedPajamaC4" }
Looking for the most perfect salad? My spinach, strawberry salad topped with sliced steak and a sprinkling of goat cheese is pure perfection. This salad is barely a recipe but enough to share for a few of reasons. Reason 1: You would gladly pay upward of $15 to eat this at many restaurants. Reason 2: It is spring and a beautiful spring salad is just what everyone needs right now. Reason 3: We eat this (or a variation) at least a few times per month. Reason 4: Maybe you haven't thought up this combination and just needed someone to strongly recommend it to you. You can make this ahead of time to have for lunches throughout the week or you can make this salad for a dinner on its own. It's hearty, full of protein and healthy carbs and good for you fats. To make it Paleo, skip the goat cheese and add more nuts. To make it vegetarian, skip the steak. A beautiful spring salad that makes for a great weeknight dinner. Cook steak, either pan fry or grill. Slice thin and set aside. In a salad bowl, toss the greens, strawberries, almonds and goat cheese. Divide salad between serving dishes and top with sliced steak. We usually serve without dressing but if you feel like you need one, we love this poppyseed dressing.
{ "redpajama_set_name": "RedPajamaC4" }
The Red Circle (1960) Watch The Red Circle (1960) Online A strange, red circle appears on the neck of a man saved from the guillotine. What is its mysterious meaning? Tragically, it turns out to be something of a family curse, as each generation thereafter bears the same sign, which in turn leads to blackmail and murder. Director: Jürgen Roland Actors: Eddi Arent, Ernst Fritz Fürbringer, Fritz Rasp, Klausjürgen Wussow, Renate Ewert, Richard Lauffen, Ulrich Beiger Country: Denmark, West Germany American Dreamer (1984) American housewife Cathy Palmer loses her memory on a trip to Paris after being hit by a car. She wakes up in the hospital believing she's the fictional international spy,… Genre: Comedy, Crime, Romance, Thriller The Long Riders (1980) The origins, exploits and the ultimate fate of the James gang is told in a sympathetic portrayal of the bank robbers made up of brothers who begin their legendary bank… Genre: Biography, Crime, Western Rampage: Capital Punishment (2014) A man takes over a TV station and holds a number of hostages as a political platform to awaken humanity, instead of money. Righting Wrongs (1986) Yuen Biao plays Jason Chan a lawyer, angry at the way the law seems to protect the bad guys, he decides to take the law into his own hands when… A lawyer is asked to come to the police station to clear up a few loose ends in his witness report of a foul murder. "This will only take ten… Man in the Shadow (1957) Genre: Crime, Drama, Thriller, Western Vault (2019) A group of small time criminals in 1975 attempt to pull off the biggest heist in American history; stealing over $30 million from the Mafia in the smallest state in… Genre: Action, Crime, Drama, History, Thriller Desperado (1995) El Mariachi, a musician, arrives in a Mexican town and is mistaken as a hit-man. He runs into trouble with a local drug lord and seeks to avenge the death… The Asian Connection (2016) Two American expatriates, Jack and Sam, unwittingly steal a drug lord's money when they rob a series of banks in Southeast Asia and become the target of the gang's vengeance. Country: Thailand, USA An ex-soldier, a teen and a cop collide in New Orleans as they hunt for the source behind a dangerous new pill that grants users temporary superpowers. Genre: Action, Crime, Science Fiction Hotel Noir Los Angeles, 1958: a detective holes up in a downtown hotel awaiting killers to come get him. During the course of one night he will meet various occupants of the… Genre: Crime, Drama, Romance, Thriller
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Despite the fact that I have newer camera bodies with better specs, there are many times when I have one of my older Canon DSLR bodies around for taking pictures. While my newer cameras use SD cards, the older bodies are still using Compact Flash, which means I can't quickly transfer the files off to my Windows 7 computer without a card reader. Or at least I thought that was the case. Canon's EOS utility, which comes in the camera box, will also work for connecting the camera, but if you're like me, you have no idea where that disk is. While Canon offers no easy compatibility for the Canon 20D and Canon 5D, as well as a few other models, there is a quick and easy workaround. As I pointed out before, the best solution is to use a card reader if you've got one. It doesn't drain the camera battery and I'm finding it less likely to have a mini-USB cable on hand. Of course, if you're looking for Windows 7 drivers for your camera, you probably don't have a card reader on hand. Canon doesn't document this as an official solution, the easiest thing you can do is go to the Menu on the camera, scroll to the Communication setting, and change the setting from Normal to PTP. PTP, which stands for Picture Transfer Protocol, is a standard designed to be able to transfer photos without the need for a driver. While this may not work with every version of Windows, it works with all versions of both 32-bit and 64-bit Windows 7, as well as Windows Vista. While there aren't any Windows 7 drivers for the 5D and 20D, you really won't need them. Switch your camera's communication mode and it will instantly be recognized.
{ "redpajama_set_name": "RedPajamaC4" }
If you are interested in dining on a dime in the City by the Bay, then check out this great rundown of Cheap Eats in San Francisco on the 7x7 San Francisco site. Also check out the 7x7 website for all things San Francisco. I know the next time I'm in San Francisco I just might check out a few of these places, because dining on the cheap for lunch is a great way to save for that splurge dinner at one of San Francisco's fantastic, gastronomic experience, restaurants.
{ "redpajama_set_name": "RedPajamaC4" }
Thinking About Food: Express Meals! The members of the foodie forum I frequent have been luckily watching Nigellas new tv series "Nigella Express" which obviously accompanies her new recipe book of the same name (which has only just come out in NZ and is horrendously priced, hence I am yet to acquire it!). Feedback on the series and the book have been mixed, with many saying that her reliance on lots of pre prepared items to speed up the meal preparation process ups the cost, calorie count and likelihood of unwanted additives! What I also love about this is the fact that my 3 year old daughter likes all three versions, mainly because I always serve it with spaghetti and she is a big fan of that! In my quest to be healthier I have found an organic whole-wheat spaghetti which is actually very nice. She is a notoriously bad eater and contrary with it- one week she will eat something, the next week she's spitting it out! So far this recipe is a stayer though, so when I am at my wits end with her, I pull this one out of my arsenal. This meal takes a maximum of 30 minutes, from start to table. To serve with this we had a mixed salad and steamed asparagus tossed in some more of our yummy olive oil. This serves 4. Fry onion and garlic in oil. Remove from pan then fry chicken until browned (do in batches to avoid it stewing). Add onion and garlic back into pan. Mix through pesto, then add evaporated milk. Mix cornflour and water together and add to chicken to thicken sauce. Simmer 5 mins, season to taste. Serve with pasta. For the bacon and mushroom version simply fry bacon and mushrooms after onion and garlic then add the evaporated milk. The same goes for the smoked salmon, cook very briefly with a few tablespoons of capers after the onion and garlic then add the milk. Some fresh parsley or dill works well to finish it. Your meal looks scruptious Linda and the presentation is beautiful.
{ "redpajama_set_name": "RedPajamaC4" }
Ruby red with notes of purple. Aromas of red fruits, in particular blueberry and raspberry. The palate is balanced with body, intensely flavorful with a slightly tannic finish. Wine SpectatorA rich, vinous version, delivering pure black cherry and currant fruit, hints of graphite and spice, and a touch of savory balsamic vinegar. Well-balanced and fresh, with a subtle finish. Drink now through 2014. 6,665 cases made.
{ "redpajama_set_name": "RedPajamaC4" }
Lil Wayne is a popular rapper who started his career at the age of 9. He started out as a member of the group the BG'z, and later became a member of the Hot Boys. He achieved massive success with the release of the Hot Boys' Guerilla Warfare. Lil Wayne went on to a solo career in 1999, with his debut album The Block is Hot. Lil Wayne continues to enjoy massive success and artistic credibility, and is reportedly a favorite performer of US President Barack Obama. [phpbay]lil wayne, 24, "306", ""[/phpbay]
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
White vs black unemployment in South Africa Staff Writer27 August 2015 DA Leader, Mmusi Maimane says that race remains a significant indicator of income level in South Africa. Speaking to the DA Students' Organisation (DASO) at the University of Cape Town on Wednesday, Maimane said that black South Africans are still being disproportionately withheld from opportunities that most white people take for granted. "The reality is that unemployment among black South Africans stands at 39% compared to 8.3% among whites," he said. "All the indicators point to an increase in the number of black people in both the middle and upper class. Between 1993 and 2008, the number of black South Africans in the middle class more than doubled but remained a relatively small portion of the total population. But the composition of the lower classes remains predominantly black," the DA lead said. "In an urban environment where social interaction across racial, social and cultural divides is more common, it is easy to forget that the vast majority of the unemployed, rural population is black." In July, data from Stats SA put South Africa's population at just over 54 million. South African population by sex and race Maimane said that people living in secluded suburbs, who bypass the townships created by the racial segregation policies of Apartheid, too easily ignore the plight of the unseen masses who reside within them. "They still suffer disproportionately from unemployment and an inferior quality of life," Maimane said. "The spatial legacy that is before us makes me realise the slow progress that this government has made in being able to build a truly inclusive, non-racial South Africa," he said. He said that the reality is that for those children born into a black household, on average they will have less access to quality services, including basic services like water and sanitation, than a child born into a white household – and will generally receive an inferior education. "This manifests through decreased access to social capital in black households, especially with regard to economic issues. "Young black South Africans simply face greater hurdles to success," Maimane said. A year ago, StatsSA research found that the unemployment rate increased from 22% to 25% over the past 20 years. Under the expanded definition of unemployment, however, the number of unemployed rose by 3.5 million between 1994 and 2014, with the unemployment rate at 35%. The expanded definition includes those who are unemployed and who are available to work, whether or not they have taken active steps to find employment. "Possibly of most concern is the increase in the unemployment rate for black Africans with tertiary education. It more than doubled, from 8% to 19%," Stats SA said. Unemployment by education level StatsSA showed that in the first quarter of 2014, approximately 25% of South African workers were in a skilled occupation, namely managers, professionals and technicians. This was an increase from 21% in 1994. Employment composition by skills Employment by the numbers Research published by StatsSA earlier in the year found that in 2014, as many as 1.5 million of the 5.1 million unemployed people were looking for a job for more than 5 years, up from 974,000 in 2008. Over the period 2008–2014, the incidence of long-term unemployment was highest among Black Africans with as many as 61.0% – 71.0% of that group looking for work for one year or longer. The unemployment rate among the white population group – ranging between 4.1% in 2008 and 7.3% in 2014 – is the lowest of all the population groups by a large margin, the data found. In 2014, black Africans account for 79.3% of the working age population but they are under -represented among the employed (73.0%) and over-represented among the unemployed (85.7%) and the not economically active population (83.3%). Compounding the dire labour market situation of black Africans, is that an even larger percentage (87.4%) of those that are unemployed have been looking for work for one year or longer, StatsSA said. Labour market rates by population group Maimane pointed out that broad definition unemployment has not dropped below 30% since President Zuma took office. Of those who are unemployed, almost two-thirds are young people, he said. The DA said that overcoming the legacy of racial economic exclusion requires more than just B-BBEE policies that enrich a small group of individuals. According to Dr Anthea Jeffery, Head of Policy Research at the Institute of Race Relations (IRR), BEE only benefits approximately 15% of the black population. "To accelerate redress you have to intensify economic growth. Broadening economic participation requires that we create an entrepreneurial culture that places small businesses at the forefront of job creation," aid Maimane. "I cannot overstate how important this objective is." Job creation is not the end, but the means to overcoming the injustices of the past and building a society in which reward is proportionate to effort, the DA said. "The DA's approach to redress focuses on the need to expand the number of job opportunities available to all South Africans while recognising the need to incentivise diversity and inclusivity," Maimane said. "I hold the belief that the project of the rainbow nation has not failed, but we must work harder to look past the short handles of skin colour and look at who we are." More on employment in SA The shocking truth about employment in SA Uncovering SA employment by race South Africa unemployment is worse now than at the end of apartheid SA unemployment is the economy's fault: Zuma Headline IRR Mmusi Maimane Quiz: Can you guess the SA company just by looking at these colours? Next article Why Muthambi spent R600,000 on a trip to America Previous article
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
11 Mistakes Business Owners Make Online – Part 1 Mistake 1 – Graphic Designers The first mistake I'd like to start off with is a big mistake and, obviously, that's why it's number one. The biggest mistake I see business owners making on the Internet is the fact that they employ a graphic designer to build their website. Now, I'm not saying graphic designers do not have a place. They do a great job, but it's only one function of a website. In fact, if you've got a pretty looking website but no one's coming there because the search engines can't find you, or there's no marketing structures or methods built into the website – so, in other words, it's not selling, it's just a glossy brochure. Some companies do just need a website that is a particular site that is informative, but most websites owned by business owners really should have marketing built into their websites. If you've got a great business but it's in the middle of the desert and no one's going past, what's the point? It's just like having a website that the search engines can't see, because a lot of graphic artists put flash onto a website. Flash is one of those big animation type of websites and the search engines can't see them. There's nothing for them to read, so it throws them away. Secondly, human visitors also click off the website too, because they don't like to see that sort of stuff loading. So, mistake number one is graphic designers who don't understand marketing and they don't understand search engines, so be careful, because what normally happens is the business owner will say to the secretary, "Can you look up a couple of places in the yellow pages or on the Internet?" And the secretary will go find a website that looks pretty. This happens a lot. This is a very common mistake and it ends up costing the business owner a lot of money, because they keep going to different graphic artists and keep spending, when really the answer is never in the graphic artist. It's in the marketing and the search engines. So, a graphic designer is the first mistake. Mistake 2 – Static Content The second mistake is static content on a website. What I mean by static content is by words on the website that do not update. There's no connection between the business and the customers, or the clients. You've really got to have a website these days that can connect out, and there are many ways of doing that. You can actually have a website that isn't really a website, it's actually a blog. What a blog can do is really get out further into the search engines, connect further out with your customers, and you can speak more directly on a regular basis because it's very easy to update your blog. And your blogs can also automatically tell the search engines that you've updated the site. Hence, blogs that actually look like a website can actually get higher up in the search engines. So, I believe the future of static html websites are on the way down, and updating content blogs that look like a website and function like a website are the way of the future. The businesses that are embracing this idea are in the forefront of the people who leave this behind, because this is the way that businesses will be run. And it's really good timely advice to go and get a website with all the correct functions. That's really a blog. Mistake 3 – No Marketing Structure Another mistake, number three, and I've already touched on this, but no marketing structure in a website. When, for example, you might go to a graphic artist to get a website made, the first question they generally ask is, "How many pages? What colors do you like? Do you want an 'about us' page? Do you want a home page? Do you want the 'contact us' page?" all that sort of stuff, which, yeah, that's got its place, but really, what is your marketing structure? How are you going to get the leads? How are you going to convert the leads from a lead to a sale? What structure's in place in your office to handle the leads? What is your offline capacity to convert the leads? What's your follow-up system? What have you got going? Marketing structure, to me, is one of the most important elements of a website because, in the marketing itself, you can really make a big difference. In fact, one of the other mistakes I see with the marketing, while we're on the subject, is the fact that it's a lack of headline, a lack of 'what's in it for me' when I see a website. When I go to a lot of traditional business websites I see the same message; "Welcome to our website, this is us," I like to see marketing. What's in it for the end user? Why should they stop? What is going to grab their attention? Why should they take action now? So, I want to see a headline there and I want to see it grab the attention of your customers. So, always think, "What's in it for your customer?" In fact, it's the same with your yellow pages. In the yellow pages if you've got 'Bobs Building' next to 'Free report: How to Avoid Building Mistakes' as a headline, what's going to grab your attention? So, it's a headline. Headlines are proven and have been around for years. I wonder why so many businesses don't use them properly. So really think about your marketing structure and message you are portraying. Mistake 4 – No Follow Through System The fourth mistake I see online, and this is a real big mistake, is the fact there's a lack of follow-through systems on the Internet. There's a lack of follow-up with email, follow-up offline through phone calls. This fits in with the marketing structure, but in itself it's very powerful. Or when you haven't got this going in your website, lack of follow-through, you can really lose out. So, we want to see follow-through systems, and we'll talk more about it later on. But when there is a lack of follow-through, again, there is no connectivity with the end customers. You can make a lot more money from your business by simply talking to them on a personal level. In fact, a famous marketer, Jay Abraham, says one of the big things is to talk to your current customers often, because most businesses only concentrate on getting fresh leads, when that's a big mistake. You should actually be really out there looking as well for fresh leads, but at the same time talking to your current clients, making sure they're okay. Because with some of your current clients, you'll find the second sale to them is a lot easier than the first sale. So, you'll make a lot more money by concentrating as part of your marketing system into follow-through systems. You can also generate referrals from your customers when you connect with your clients more often.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
George T. Edwards – Leesville, SC By admin on March 4, 2019 Comments Off on George T. Edwards – Leesville, SC Mercantile Funeral Home Johnston Chapel 384 Lee St. Johnston, South Carolina 29832 George T. Edwards, age 87, of Leesville, SC, formerly of Columbia, SC went home with the Lord on Friday, March 01, 2019. Funeral services will be held at 11 AM Wednesday, March 06, 2019 at Mercantile Funeral Home Johnston Chapel, 384 Lee St. Johnston, SC 29832 with the Rev. Bob Woodyard officiating. Burial with Military Honors at Sunset Gardens Memorial Cemetery, Johnston, SC following services. The family will receive friends from 10 to 11 AM before the service at Mercantile Funeral Home Johnston Chapel. Mr. Edwards was born in Johnston, SC, to the late Alonzo and Edna Eubanks Edwards and was a member of Rocky Creek Baptist Church. In addition to his parents: he was preceded in death by his beloved wife Ida Schmitt Edwards (native of Wurzburg, Germany), his brothers, Earl, Simmie, Clyde and his sister Annie Ruth Edwards. He leaves behind his treasured sons, Frank (Lisa) Edwards of Atlanta, GA and Jim Edwards of Columbia, SC, grandchildren Nichole (Brannon) Harris, Sarah (Jared) Worley and six great-grandchildren. Relatives include his niece, Jeanette (Clyde) Holmes, nephews Larry (Tammy) Edwards and Tony Edwards. Other relatives include sister in law, Thea Fegelein, nieces and nephews, Rainer (Reinhilde) Fegelein, Isabella (Sven) Wunsche, Florian (Ursula Schlichtmann) Fegelein, Bettina Fegelein, Daniela (Stefan) Petzold, Jutta (Willi) Scheele, Ulrich (Annette)Schmitt and many other loved ones in Germany and America. George served in the U.S. Army for 23 years, including tours overseas in Germany, Korea, Thailand, Taiwan, and Vietnam where he was awarded a Bronze Star. After retiring from the Army in 1975, he went to work with the Defense Department as a representative for Tank Automotive Command (TACOM) at Fort Jackson, SC. George was called out of retirement to work for TACOM once again during the first Gulf War. George loved spending time with all his family in America and Germany. He enjoyed many good times with his retired military buddies. He especially loved spending time with friends and the staff at Lizard's Thicket in Lexington. He liked bluegrass music and going to Bill's Pickin' Parlor. One of his passions was attending car shows with his 1941 Ford Coupe which he completely restored himself using his many years of automotive knowledge. For the last nineteen months he lived with and was cared for by the wonderful caregivers and staff at Oak Leaf Village of Lexington. He was loved by many. George will forever be missed for his joy of life, warmth and quick-witted sense of humor. Memorials may be made to Rocky Creek Baptist Church, 632 Rocky Creek Rd., Johnston, SC 29832 or to a charity of your choice. Please sign the online register book at www.edgefieldmercantilefh.com. George T. Edwards – Leesville, SC added by admin on March 4, 2019
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
A great series featuring current and unbiased information, ideal for use by secondary school students for assignments, essays and debates. Are you stumped on homework? Connect directly to live online tutors with Studiosity. Available Sunday-Friday 3pm-10pm. It used to be YourTutor. New name, same great service! Know it as YourTutor? They have a new name and logo, but they're the same people, giving you the same quality, free, live service. Check out these amazing and helpful encyclopedias for all your assignments this semester. Struggling with homework? Need to ask a question? Have a chat to the lovely tutors at YourTutor, who will give you some help. Stuck With that Assignment and Need Help? Connect with Studiosity in minutes and get unstuck now! Tutors are available online Sunday-Friday, 3pm-10pm AEST.
{ "redpajama_set_name": "RedPajamaC4" }
Ilankai Tamil Sangam... Present Projects / Ganesh - Kiruba Music Group/ Artists donation ILankai Tamil Sangam, USA has broadcasted a brilliant performance from Ganesh-Kiruba orchestra group with their artists during the live streaming event of Sangamam 2020. As you all know these artists are struggling as the shows are impacted by the global pandemic. If you are in appreciation of their talent and would like to support them during these difficult times, use the donation tab to contribute via paypal. The Ilankai Tamil Sangam, USA, is an association of Tamils from the island of Ilankai now residing in the United States of America. Formed in 1977, the Sangam is the oldest association of these Tamils in the United States of America. Enter your email and you'll be one of the first to get new updates: Address: Ilankai Tamil Sangam, USA P.O. Box 46, Maryknoll, NY 10545 Email: President: [email protected] Secretary: [email protected] Editor: [email protected] Copyright 2017 Ilankai Tamil Sangam, USA - All rights reserved.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Paycheck Fairness Act Takes Center Stage Can anyone have seriously imagined that a retired worker from Goodyear would rise to national prominence over a case she lost at the U.S. Supreme Court regarding statute of limitations? And yet, at tonight's Democratic National Convention, Lilly Ledbetter will take center stage for a few minutes. No doubt we'll hear about the Paycheck Fairness Act bill because she's not endorsing anyone for President. "Equal Pay for Equal Work" has been one of the talking points of the week. There's been lots of talk of late about the act, which arose from the Ledbetter case (though there was also a Lilly Ledbetter Fair Pay Act bill out there as well). One of the bill's co-sponsors, Rosa DeLauro commented on it on the Huffington Post late last week and I summarized the latest debate about the bill in a post as well. Businesses and others have been critical of the act, even though it passed the U.S. House of Representatives last month (Heritage WebMemo, 7/30; Examiner, 8/6; OpenMarket, 8/6). What's missing from the debate about the bill, unfortunately, is a discussion about what the bill is about and should be about. It's not really about pay equity — after all, we already have the Equal Pay Act for that. It's really about allowing indivdiuals to recover much more in the way of damages than they could otherwise recover (though you'd be hard-pressed to make heads or tails of it from the seemingly technical language used). And frankly, there's nothing wrong with advancing that goal if there was a fair debate on the merits. But unfortunately, the public debate on the bill seems to fall into the classic stereotypes that each side rolls out with a piece of new legislation. Proponents of the bill suggest that those who are for the bill are FOR pay equity, and those opposing the bill are AGAINST pay equity, which is just hyperbole. Opponents of the bill have used hyperbole of their own, ignoring the fact that corporations have had to comply with the Equal Pay Act for years and that many are well-suited to address such claims. It's hard to see how some changes will have any real impact on employers. For instance, one part changes the language regarding a "factor other than sex" defense that an employer can raise to a "bona fide factor other than sex". While one can debate the theorhetical differences in language, the real-world effect of the change is probably minimal for employers. After all, do employers really make salary decisions and think "well, I can explain the differences with reason, but is it a 'bona fide' reason"? And small businesses will be excluded from the act, in the same way that they are excluded from coverage under the Fair Labor Standards Act. On the other hand, proponents of the bill gloss over the fact that removing some caps on compensatory and punitive damages — as the bill proposes — could have a significant effect on employers and the likelihood of lawsuits (one need only look at the rise of Title VII litigation after the Civil Rights Act of 1991 was passed for a historical perspective). Proponents also ignore the fact that the punitive damages portion of the bill would mark a change in philosophy regarding punitive damages (to see the changes in context, click here). For example, one change would allow punitive damages to be awarded even when no intentional discrimination has been proved — which contradicts the traditional notion that punitive damages should be issued to punish the defendant for some type of malice or reckless behavior. The political reality is that some version of this bill is going to get passed and employers need to keep a watchful eye on the bill. We'll see in the upcoming weeks whether a compromise is eventually fashioned (much like the compromise being done for the ADA Amendments Act of 2008) or whether this is just political posturing in an election year. Either way, here's (perhaps foolishly) hoping that the debate on the bill's merits gets more substantive than just slogans. (At Point of Law, Walter Olson's other site, Carter Wood provides his insights into tonight's happenings as well.) Filed under: Lilly Ledbetter, trial lawyer earmarks, workplace By Daniel Schwartz Either way, here's (perhaps foolishly) hoping that the debate on the bill's merits gets more substantive than just slogans. Oh, HA HA HA HAA ha haaa haa ha ha… Thanks, I needed some humor today. By Deoxy I knew someone would find the humor in that. Too bad hope and optimism are in short supply nowadays…. Thanks for the post. I feel like banging my head against the wall every time I read a news or blog story about the Ledbetter case or any of the proposed legislation it has spawned that fails to mention the Equal Pay Act. And that's pretty much every story (other than at Overlawyered and a few management-side employment law blogs). As far as I can tell from the Court's opinions, when Ms. Ledbetter's trial attorneys dropped or waived her EPA claims, they shafted her far worse than anything she claims her employer ever did. By JP […] post on the topic at Point of Law.com, and employment lawyer Daniel Schwartz examines the related Fair Pay Act at Overlawyered.com. We imagine the claims, complaints and supposed solutions will flow freely tonight, so at least […] By Shopfloor » Blog Archive » A Night of Workplace Grievances at the Democratic Convention This is the kind of thoughtful analysis that keeps me coming back to this site (along with the lurid tales of Scruggs and Lerach, of course). By jbd from http://www.ctemploymentlawblog.com/2008/08/articles/legislative-issues/paycheck-fairness-act-rep-rosa-delauro-provides-some-context/ Indeed, the irony of the Ledbetter case is that there already exists a law that would have permitted Ledbetter to sue. The Equal Pay Act specifically addresses pay disparity and has a longer statute of limitations. But for some reason, Ledbetter's attorney chose to sue under the all-purpose anti-discrimination law, Title VII, thus dooming her claims. So lost in all the demagoguery is that fact that Ledbetter should have just sued her lawyer for malpractice. After all that's probably what she would have done to a doctor who prescribed the wrong antibiotic for an infection. By Bumper From reading the changes in context I don't see where: (a) the cap on punitive damages is removed; (b) where it allows punitive damages without proof of intent. By Bill Poser Gender discrimination cases are normally subject to Title VII which has a cap on punitives. Here, the PFA would expand 206(d)(1) without any cap on punitive damages. You have to look back at 29 u.s.c. 206 (d) to see it and its not even in the changes in context version. It would also allow punitives in cases of disparate impact, in which a policy or practice may have an impact on a protected group, but was not intended to be discriminatory. I see. Then it is really deceptive. The parts that one can make out in the changes in context version seem quite reasonable, in some cases just clarifications, and in one case even a limitation on the previous version. I absolutely agree with you. But conservatives do a better job at this than liberals do. No Child Left Behind? Who would vote to leave a child behind? Look at the debate over tort reform, language created by the right and then adopted by all. Reform? Reform is always a pretty good idea, right? Tax relief. Is that a fair way to frame the issue? You are either for relief or you are against? The list goes on and on. […] Daniel Schwartz at Overlawyered examines Ledbetter and the also misnamed Paycheck Fairness Act, encouraging more discrimination lawsuits. […] By Shopfloor » Blog Archive » Lilly Ledbetter at the Democratic convention
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Looking for ideal Oxygen Humidifier Bottle Instructions Manufacturer & supplier ? We have a wide selection at great prices to help you get creative. All the Oxygen Humidification Bottle are quality guaranteed. We are China Origin Factory of Oxygen Concentrator Humidifier Kit. If you have any question, please feel free to contact us.
{ "redpajama_set_name": "RedPajamaC4" }
Q: Bootstrap Collapse Button & Collapsible list group not collapsed Can anyone help with this? I am so beginner with Bootstrap and practicing it from its site but I don't know how to make it collapsed. I liked collapse.js, jquery.min.js, bootstrap.min.js, transition.js and added the below into html. It shows the hidden div but when clicking the button again, it doesn't collapse the well part back. <a class="btn btn-primary" role="button" data-toggle="collapse" href="#collapseExample" aria-expanded="false" aria-controls="collapseExample"> Link with href </a> <button class="btn btn-primary" type="button" data-toggle="collapse" data-target="#collapseExample" aria-expanded="false" aria-controls="collapseExample"> Button with data-target </button> <div class="collapse" id="collapseExample"> <div class="well"> ... </div> </div> It's the same as Collapsible list group as below. It shows the hidden content after clicking the tab but if I click it again, it doesn't hide the content. <div class="panel-group" role="tablist"> <div class="panel panel-default"> <div class="panel-heading" role="tab" id="collapseListGroupHeading1"> <h4 class="panel-title"> <a href="#collapseListGroup1" class="collapsed" role="button" data-toggle="collapse" aria-expanded="false" aria-controls="collapseListGroup1"> Collapsible list group </a> </h4> </div> <div class="panel-collapse collapse" role="tabpanel" id="collapseListGroup1" aria-labelledby="collapseListGroupHeading1" aria-expanded="false" style="height: 0px;"> <ul class="list-group"> <li class="list-group-item">Bootply</li> <li class="list-group-item">One itmus ac facilin</li> <li class="list-group-item">Second eros</li> </ul> <div class="panel-footer">Footer</div> </div> </div> </div> Please advise me. Thank you very much for your time and help. A: What versions do you use bootstrap and Jquery.According bootstarp 4.0.0 , you should use jquery 1.9.1. And then you don't need to use collapse.js and transition.js.These are also include in bootstrap.min.js. <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script> <script src="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.0.0/js/bootstrap.min.js"></script> <link href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.0.0/css/bootstrap.min.css" rel="stylesheet"/> <div class="panel-group" role="tablist"> <div class="panel panel-default"> <div class="panel-heading" role="tab" id="collapseListGroupHeading1"> <h4 class="panel-title"> <a href="#collapseListGroup1" class="collapsed" role="button" data-toggle="collapse" aria-expanded="false" aria-controls="collapseListGroup1"> Collapsible list group </a> </h4> </div> <div class="panel-collapse collapse" role="tabpanel" id="collapseListGroup1" aria-labelledby="collapseListGroupHeading1" aria-expanded="false" style="height: 0px;"> <ul class="list-group"> <li class="list-group-item">Bootply</li> <li class="list-group-item">One itmus ac facilin</li> <li class="list-group-item">Second eros</li> </ul> <div class="panel-footer">Footer</div> </div> </div> </div>
{ "redpajama_set_name": "RedPajamaStackExchange" }
The mission of the La Vida Rock Gym is to provide a safe, fun, and encouraging environment for kids and adults as they learn and practice climbing and belaying skills. Open Gym is our public climbing program offering a welcoming environment to climbers of all ages and abilities. We also host theme nights and other fun events throughout the year.
{ "redpajama_set_name": "RedPajamaC4" }
Page 51 Of 05.aba-architects.com: Olympus Viewer 3 As Wells As Long Acre Farms With Wacom Bamboo Fun Driver Plus Sony A5000 Vs A6000 Then E To The Infinity Also Canon Ae 1 Battery. Hilarious start point was kyoto i went upstairs downstairs to see if camera records changes of it did a olympus tough shooting report photo yodobashi. Encouraging der olympus viewer ist der einzige kostenfreie raw konverter indiesem trotzdem macht er seinen job die tonnenförmigeverzeichnung korrektur der tonnenförmigen verzeichnung von raw fotos mit. Startling sous olympus la par si le même fichier lapossibilité le cadrage choisit à la prise.. Fantastic macedon new york maggie joe wedding at long acre farms macedon new york touch design photography maggie joe wedding at long acre farms. Neat click to enlarge long acre farms selling its produce on a recent photo by holly ravazzolo long acres farms gets boot from longtime perch on loop. Dazzling crop kilbys sell creamery operation to couples business long acre farms birthday party long acre farms ice cream kilby farm was recently s to tw.. Prissy of see more wacom bamboo graphics drawing tablet picclick uk wacom bamboo cth driver wacom bamboo driver windows 8.1. Masterly how it jamie ran consumer electronics andmobile bamboo at before he was bamboo bamboo driver download wacom bamboo driver cte 450 wacom bamboo installation cd. Wonderful wacom bamboo cth drivers download wacom bamboo driver not working wacom bamboo driver win7. Beauteous wacom bamboo pen wacom bamboo pen c edinburg.. Stylish inner pinch lens lens cap sony fotodiox reversible lens hood kit usa sony a5000 vs a6000 dxomark sony a5000 vs a6000 video quality kit sony e pz oss power zoom lens tulip lens hood. Attractive beginners sony andmost sony e mount meike large aperture manual prime fixed lens sony a5000 vs a6000 indonesia sony a5000 vs a6000. Cheerful buy underwater housing sony get free shipping on buy underwater housing sony get free shipping on sony a5000.. Piquant road to infinity war hitting aters april e to power infinity what does e to infinity equal. Sophisticated infinity 85da20aj dt05 e tweeter infinity primus models e to infinity is zero e to positive infinity. Exciting a infinity sign vector image letter e letter e a infinity sign royalty free vector image e infinity uk 1 over e to infinity. Horrible infinity heart tatuagen designs heart tatuagens designs ideas emeaning tatuagens you tatuag.. Calmly canon battery canon battery album on imgur canon ae 1 battery energizer canon ae 1 battery door. Thrifty adventures film canon program analog senses canon ae 1 battery varta canon ae 1 battery grip all. Lovable canon ae 1 battery check button canon ae 1 battery size illustrative purpose canon used canon slr manual focus camera image shown is. Intriguing canon chrome camera body canon chrome camera body at keh camera store canon ae 1 batter.. Calmly how many times have users wondered what can y do to shoot better photosat night or elephone will come low light camera lens low light camera settings camera sensor combination. Artistic pixel camera has low light pradeep singh on pixel camera has low low light camera cheap low light camera settings. Captivating 2017 gear patrol low light camera under 1500 low light camera reddit intense digital cameras new models provide faster shooting. P.. Cute games we will amd ryzen custom pc review though we assume this isa graphics bound scenario here we see dx ryzen keeping up this will be one. Neat new ryzen prodesk chips aimed squarely at workstations used amd ryzen pro targets h on professional workstations its announcement amd is following up on epyc. Fun bad motley fool ryzen 1700 or 1700x ryzen 1700 vs 1700x video editing good. Alluring dirt oculus amd stock amd intel vr vive rift ryzen.. Seemly malaysia hp 2009m monitor going to sleep hp 2009m monitor touch screen prices hp ips led backlit monitor hp computer monitors. Fantastic similar items hp 2009m monitor no signal hp 2009m monitor keeps going to sleep hp ips led backlit monitor hp ips led backlit monitor. Congenial hp 2009m monitor going to sleep hp 2009m monitor won't turn on hp w1907 19 widescreen lcd monitor built. Pretty gaming setups hp 2009m monitor blinking blue light.. Bodacious ikelite underwater housing canon powershot elph elph ixus ixus hs ikelite underwater housing canon powershot elph hs canon powershot elph 360 hs charger canon powershot elph 360 hs battery. Christmas optical zoom canon powershot elph 360 purple canon powershot elph 360 hs digital camera review canon powershot elph hs optical zoom canon powershot elph hs. Flagrant canon powershot elph hs digital camera downtown camera canon powershot elp..
{ "redpajama_set_name": "RedPajamaC4" }
2014 was a busy year of exciting new product releases and refreshes for Schiit Audio, and 2015 has seen no let up. Following the anticipated unveilings of Yggdrasil and Ragnarok, the company's long-promised 'cost no object' statement DAC and amplifier, Jason Stoddard and Mike Moffat have been swift and sure-footed in bringing their recently dethroned flagship DAC, Gungnir, and solid-state headphone amplifier, Mjolnir, back into focus. This summer saw the release of the Gungnir Multibit DAC and Mjolnir 2 tube-hybrid headphone amp. Gungnir Multibit makes good on Schiit's 'trickle-down promise' to flow state-of-the-art technology from their statement models downward through the hierarchy without violating their pricing structure of affordability. Nicknamed 'Yggdrasil Junior', Gungnir Multibit is the first of Schiit's existing delta-sigma DACs to be made available with the multibit architecture and uses medical-grade precision R2R D/A converter chips never before used in audio applications, and a unique 'mega-combo-burrito' filter that is claimed to optimise both the frequency and time domains (thus preserving critical spatial information). The filter in Gungnir Multibit is the same 18,000-tap one used in Yggdrasil, but the four D/A converters are 18-bit Analog Devices AD5781BRUZ instead of the much pricier 20-bit AD5791BRUZ. Other sections have been scaled down too, in order to bring "class-leading Yggdrasil multibit performance to a more affordable price point". More affordable indeed; Gungnir Multibit can be bought for half the price of Yggdrasil and, in accordance with Schiit's 'anti-obsolescence' pledge, existing Gungnir owners can have their delta-sigma models upgraded to multibit. All other features that are present in the previous version of Gungnir remain, including the balanced and summed single-ended outputs, proprietary Adapticlock VCXO/VCO clock regeneration, and the previously optional USB input now becomes standard. To allay fears from those who think the 18-bit Gungnir Multibit comes up short of competitors whose D/A converters are specced up to 32 bits, it is worth noting DACs that claim more than 20 bits of resolution cannot actually achieve this in practice due to other bottlenecks in the implementation. The 'Equivalent Number Of Bits' measurement takes these bottlenecks into account, and reveals that even the highest specced DACs available to audio consumers have an achievable resolution no greater than 20 bits. On-paper comparisons of course tell us very little about sonic performance, which is not only linked to the technology itself, but is also influenced to far greater extent by the engineer's implementation of it. Moffat's design of the Mobile Fidelity Sound Labs A/D GAIN mastering system in the early nineties should instill confidence in the calibre of Gungnir Multibit. Mjolnir 2 crystallises a vision Stoddard had several years ago to create a headphone amp that could be completely solid-state or tube-hybrid. It advances its pioneering predecessor by becoming the first inherently balanced tube-hybrid headphone amplifier that utilises Schiit's unique balanced, differential circlotron-style topology. Many attributes from the first Mjolnir have been retained, including the capability to drive most of the current- or voltage-hungry headphones in existence. Halving as the load doubles, its 4V balanced output delivers 8W RMS per channel into 32 ohms and 425mW RMS per channel into 600 ohms. Some specs have also been improved, such as the power supply rails which have been uprated from 90V to 200V. More interestingly, several features have been added to Mjolnir 2 to improve its connectivity and versatility. The first of these is a gain switch that can be toggled between 8 (18dB) and 1 (0dB), allowing users with even the most sensitive of IEMs to enjoy an inaudible noise floor and usable range on the volume pot. Stoddard's biggest regret about the first Mjolnir has also been adressed, namely single-ended outputs. Mjolnir 2 now adds a summed single-ended headphone output and summed single-ended RCA pre-outs for good measure, bringing connectivity parity to users of both topologies. The power of the 2V single-ended headphone output is one quarter of the balanced (half the voltage swing = quarter the power), but is still more than adequate for most 'phones. Mjolnir 2 is available to purchase with either Schiit's stock 6BZ7 tubes or their all-new LISSTs (Linear Integral Solid-State Tubes), which are straightforwardly described as "a pair of depletion-mode MOSFETs in a tube-sized can". The LISST is what cleverly turns Mjolnir 2 back into a purely solid-state amp with a sonic profile very similar to, but improved upon, its predecessor, according to its designer at least. The choice between vacuum tubes and LISST ultimately comes down to personal sonic preference. However, if you want to have your Schiit and eat it, you can of course purchase both. This would allow flexibility, for example, to switch things up based on mood, connected ancillaries and source material, or aid in the preservation of some uber expensive NOS tubes for special occasions. To which end the stock 6BZ7 tubes can be swapped out for 6DJ8, 6922, ECC88 or 2492 tubes, so listeners can spend days, weeks, or even months rolling the sound to taste. Although Schiit soak test their products prior to shipping, there is anecdotal consensus that both Gungnir Multibit and Mjolnir 2 benefit significantly from a longer initial burn-in, during which time permanent sonic changes are reported to occur in both models. Roughly 300 hours for Gungnir Multibit and around half this time for Mjolnir 2 is recommended for the sonic signature of each unit to plateau. A particular caveat of Gungnir Multibit - and Schiit's other multibit DACs - is the recommendation to leave it powered on continually for optimum performance. The multibit D/A converter chips become more accurate as they reach thermal equilibrium - resulting in increased dynamic range and decreased jitter - and this equilibrium apparently takes considerable time to achieve. Those unable or unwilling to leave audio equipment powered up 24/7 should note that while I did find that the sound improved the longer it was on, I certainly wasn't underwhelmed by the performance of Gungnir Multibit during its first few hours from cold. To learn what each model brings to the party, Gungnir Multibit and Mjolnir 2 were first evaluated individually within the context of my existing system (listed at the end of this review), before being paired together to discover how well they stack up as a complete solution. Gungnir Multibit's sonic signature is intriguingly different to any other DAC I have listened to, and it was initially quite a challenge to hear recordings, with which I thought I had intimate familiarity, presented in this way. Music emanates from a distant, inky black expanse, ebbs and flows with natural fluidity, and possesses an incredible smoothness and depth that is reminiscent of a high-end analogue system. There is a distinct absence of digital glare and transients are reproduced cleanly with grainless decay, contributing to a more solid and focused sound with longer and quieter pauses between notes. It has been suggested that this may be the result of more accurate rendering of transients, that are no longer unfaithfully lengthened by the pre- and post-ringing inherent in delta-sigma converters. Many DACs often struggle to do smoothness and detail and end up prioritising one at the expense of the other, but Gungnir Multibit achieves an excellent balance of both. It is not a forensic analyser, but its proficiency in reconstructing spatial cues grants listeners a level of access to the recording space that few other DACs do at this price. Gungnir Multibit provides more room around individual instruments, expands the boundaries of the performance venue, and most interestingly of all increases the distance between the musicians and the listener. The latter is not what I would normally consider to be a desirable quality as it implies a loss of intimacy and connection, but here the increase in distance has the opposite effect. By presenting to the foreground, delta-sigma converters tend to produce a perceivably vibrant and frenetic sound at the expense of micro-dynamics and depth. It is like being in the front row at a packed concert; the immediacy of the visual spectacle and 'wall of sound' are thrilling, but you are too close to appreciate all of the individual elements at their intended distances, intensities and timings, and many subtleties are obscured as a result. Listening to Gungnir Multibit it is like being alone in the auditorium; there is nothing to distract your attention from the musical mastery unfolding before you, and you can sit a few rows back, relax and fully appreciate the intended scale, dimensionality and dynamism whilst still being completely immersed in the experience. Mjolnir 2 immediately impresses with its exceptionally low noise floor. This amp is super quiet and provides a spookily muted backdrop for low-level detail to emerge from, especially on the low gain setting which is so silent through over-the-ear headphones you would think you were in an anechoic chamber! The Alps volume pot tracks with very high accuracy and remains transparent and channel-balanced on both gain settings all the way down to whisper-quiet levels. The low gain setting is very useful in practice, not only for IEM users but also for those with less sensitive 'phones, as it allows you to dial in your desired listening level with near infinitesimal accuracy. With an abundance of power on tap, the amp drives MrSpeakers Ether (22 Ohm) and Sennheiser HD600 (300 Ohm) headphones effortlessly. That said, in solid-state mode (i.e. LISSTs installed) I was a little underwhelmed with Mjolnir 2's sonic presentation. It is remarkably neutral, linear, clean and fast, however it is also quite tonally bland and spatially unidimensional. Instrument timbres are somewhat homogenised and lack texture, and the overall presentation is a bit uninspiring and difficult to engage with. Swapping out the LISSTs for the stock 6BZ7 vacuum tubes brings Mjolnir 2 to life. Personality and musicality is injected without sacrificing the commendably impartial tonal balance, and the soundscape becomes rich, variegated and palpable. The previous overly lean and grippy bass is allowed to bloom and have its tuneful impact felt without being undesirably sluggish. Mids are majestically mellifluous in tone yet remain very open, detailed and transparent. Highs are impressively extended, invigoratingly crisp and articulated with improved micro-detail distinction. The soundstage grows in all dimensions with instruments more clearly layered and spaced around the listener in an enveloping sphere of sound, giving a heightened sense of being at the epicentre of the performance. The stock tubes are not too 'tubey' sounding and retain an excellent level of transparency, neutrality and speed. They are in fact a very good bridge between dry solid-state sound and the more euphonic sound that vintage NOS tubes typically produce, and are an excellent starting point for those wishing to enjoy the best of both worlds. Together, Gungnir Multibit and Mjolnir 2 deliver an intoxicating listening experience and would constitute an 'end-game system' at this level for many audio enthusiasts, especially if the balanced topologies in both are exploited. While the single-ended circuits are excellent, trading up to balanced elevates the performance to exceptional - and I dare say peerless - in this price range. This should not surprise, since both models were designed from inception to run balanced. Schiit are resolute about the superiority of balanced over single-ended when properly implemented and in the context of these components at least I am compelled to concur. I detected improvements in clarity, presence, separation, spaciousness and dynamics each time I replaced a single-ended connection with a balanced one, first between the DAC and amp and then between the amp and headphones. The difference between all single-ended and all balanced was not a trivial one and, in my experience, only the latter allows Gungnir Multibit's resolution and musical fluidity and Mjolnir 2's rich palette of textures and vivid holographics to be fully appreciated. Schiit Audio has taken many by surprise with the speedy inclusion of its flagship multibit technology into the Gungnir DAC, and transformation of the Mjolnir headphone amp from its debut solid-state incarnation into a tube-hybrid design that can neatly revert to the former. Individually, these are laudable products with interesting USPs that set them apart from pricier peers. Together, the two units complement each other exceptionally well and offer a seductively revealing, immersive and textured listening experience in which music is allowed to breathe freely. Their combined price-to-performance ratio verges on the ridiculous. For well under £2k you can invest in a highly resolving, emotionally engaging system that is both multifunctional and customisable, and has provision for future upgrade when further advances are made. Jason Stoddard and Mike Moffat may be long-toothed stalwarts, but Gungnir Multibit and Mjolnir 2 demonstrate that they are not merely going through the motions with trivial tweaks or pandering to short-lived fashions. In fact if Stoddard's recent comments are anything to go by, there is even more in the Schiit pipeline for 2016 to really stir up the consumer audio industry. Computer hardware & software: Mac Mini 2010, Mac OS 10.6.8, Audirvana Plus 1.5.12, iTunes 11.4. Headphone reference system: Schiit Bifrost Uber DAC, Schiit Valhalla OTL tube headphone amp, MrSpeakers Ether and Sennheiser HD600 headphones. Main reference system: Schiit Bifrost Uber DAC, Yamaha A-S2000 integrated amp, Tannoy Monitor Gold 15 and Tannoy Autograph Mini loudspeakers.
{ "redpajama_set_name": "RedPajamaC4" }
Home/Rod Dreher/The Persecution Of Jack Phillips The Persecution Of Jack Phillips Jack Phillips (ADF photo) They're at it again: Colorado leftists, abetted by the state's civil rights commission, are harassing Masterpiece Cake Shop baker Jack Phillips. This time, a transgender who has been trolling Phillips for some time filed an anti-discrimination complaint against him. David French gives background: Here's what happened. According to a verified complaint filed today by my old colleagues at the Alliance Defending Freedom, on June 26, 2017 — the very day the Supreme Court granted Jack's request to review his wedding-cake case — a lawyer named Autumn Scardina called Masterpiece Cakeshop and "asked Masterpiece Cakeshop to create a custom cake with 'a blue exterior and a pink interior' — a cake 'design' that, according to the lawyer," reflected "the fact that [the lawyer] transitioned from male-to-female and that [the lawyer] had come out as transgender." Lest anyone wonder whether this request was made in good faith, consider that this same person apparently made a number of requests to Masterpiece Cakeshop. In September 2017, a caller asked Phillips to design a birthday cake for Satan that would feature an image of Satan smoking marijuana. The name "Scardina" appeared on the caller identification. A few days earlier, a person had emailed Jack asking for a cake with a similar theme — except featuring "an upside-down cross, under the head of Lucifer." This same emailer reminded Phillips that "religion is a protected class." On the very day that Phillips won his case at the Supreme Court, a person emailed with yet another deliberately offensive design request: I'm thinking a three-tiered white cake. Cheesecake frosting. And the topper should be a large figure of Satan, licking a 9″ black Dildo. I would like the dildo to be an actual working model, that can be turned on before we unveil the cake. I can provide it for you if you don't have the means to procure one yourself. And finally, two days later, a person identifying as "Autumn Marie" visited Phillips's shop and requested a cake featuring a pentagram. According to ADF, "Phillips believes that person was Autumn Scardina." Now the state's civil rights commission is charging Phillips with illegal discrimination. It's as if the state is giving a finger to the Supreme Court. Phillips and the Alliance Defending Freedom are suing the state, and thanks to ADF's deep pockets, they will probably win again. But this just goes to show how petty the left can be in power. If not for ADF, how would a Christian small businessman like Jack Phillips defend himself? Andrew Walker of the Southern Baptist Ethics & Religious Liberty Commission explores the meaning of this latest move. He makes a strong point that "the attempt by progressives to make an example of Phillips is a sign of civic sickness." He means that there are ways to deal with these conflicts that don't require going to the courts — as long as people don't demand that they get their way in every instance. He brings up an interesting case of this happening recently to the ERLC. Excerpt: A few months ago, our creative director responsible for branding the ERLC's logo on various clothing items such as polo shirts or jackets was informed by a nationally-known brand that the ERLC's mission did not align with their corporate values, and we were prohibited from putting our logo on their clothing. To put it bluntly, the Ethics and Religious Liberty Commission, an entity of the Southern Baptist Convention, was unabashedly discriminated against. When our creative director walked into my office to notify me of this, my first response was to smile. Why? Because the ERLC had been the victim of discrimination, and I knew an opportunity like this meant the ERLC could pursue the moral high ground. What progressivism does to dissenters, we would not do to them. I'm not going to identify what the particular brand was that discriminated against the ERLC, because the ERLC is not looking to score points against this particular company nor are we looking to file any type of lawsuit. Another option was available: Avail ourselves of the hundreds or thousands of other companies that would be willing to take our money in exchange for their product. We did. Read the whole thing. Bravo, ERLC! It could have made a big public case out of this, but the ERLC decided to live by its own principles. Progressives could take a lesson from the Southern Baptists on how to be civil. Here's a political lesson from a leading Evangelical: This is surreal. Apparently the state-sponsored vendetta against this man will never end. Sadly, if you want to know why so many evangelicals were willing to hold their noses and vote for Trump, look no further than this outrageous government overreach. https://t.co/9yfyAECDdd — Thomas S. Kidd (@ThomasSKidd) August 15, 2018
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Sacramento Police Credit Nextdoor.com Partnership For Significant Drop In Crime SACRAMENTO (CBS13) — Sacramento Police are crediting a social-media tool they've been using for the past year for a double-digit decrease in crime. Angela Wood has been living in the Pocket area of Sacramento for a decade. But it wasn't until recently that she got a better feel for what's really going on in her neighborhood. "Well it's pretty quiet down in our neck of the woods, which is a good thing. But there are different things that happen," she said. "There was some drug bust." She's more in touch with her neighborhood thanks to a year-old partnership between the Sacramento Police and Nextdoor.com. "We've had crime tips come in," said Lt. Justin Risley. "For example, we've investigated a graffiti series. We've had people come forward with information that's relevant to the investigation." Police can post alerts and requests for information, and neighbors can ask cops questions. The department says the partnership has paid off, citing a 10 percent drop in crime last year and more progress this year. "Right now, year to date, we're down almost 15 percent on top of the 10 percent we did already that's phenomenal," said Chief Sam Somers. Sacramento has the only police department in the area to connect with people on Nextdoor.com, but the Kelsey Grady says the company is recruiting others. "We have to train them, they have to understand the platform, but of course we want to get as many police departments on board as possible," Grady said. Right now, 86 percent of Sacramento neighborhoods are on the site, and the goal is to reach 100 percent by next year. "To be able to reach thousands of people at one click of that return button to send it out is really an amazing thing for us," Risley said. The partnership is free for the city of Sacramento.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Oregon Turfgrass Foundation (OTF) As Amended January 17, 2017 ARTICLE I 1.1 Registered Office and Registered Agent. The registered office of the corporation shall be located in the State of Oregon at such place as may be fixed from time to time by the Board of Directors upon filing of such notices as may be required by law. The registered agent shall have a business office identical with such registered office. 1.2 Other Offices. The corporation may have other offices within or outside the State of Oregon at such place or places as the Board of Directors may from time to time determine. ARTICLE II The corporation shall have no members. ARTICLE Ill 3.1 Number and Powers. The management of all the affairs, property, and interests of the corporation shall be vested in a Board of Directors, consisting of not less than nine (9) persons nor no more than fifteen (15) persons. The Board of Directors shall be elected by the then current Board of the OTF at each annual meeting. The Annual meeting will be the first meeting of each calendar year – typically in January. Directors shall be elected by the then current Board of Directors. In addition to the powers and authorities expressly conferred upon it by these Bylaws and Articles of Incorporation, the Board of Directors may exercise all such powers of the corporation and do all such lawful acts and things as are not by statue or by the Articles of Incorporation or by these Bylaw as directed or required to be exercised or done by the members of the corporation. Each director shall serve for a minimum term of one (1) year which shall commence upon the date of the annual meeting, subject to the provisions of 3.3 herein. The current President of the Oregon Golf Course Superintendent Association (OGCSA) will maintain a permanent position on the OTF Board for as long as their position exists on the OGCSA Board. 3.2 Change of Number. The number of directors may at any time be increased or decreased by amendment of these Bylaws, but no decrease shall have the effect of shortening the term of any incumbent director. 3.3 Vacancies. All vacancies in the Board of Directors, whether caused by resignation, death or otherwise, may be filled by the affirmative vote of a majority of the remaining directors even though less than a quorum of the Board of Directors. A director elected to fill any vacancy shall hold office for the unexpired term of his or her predecessor and until a successor is elected and qualified. 3.4 Regular Meetings. Regular meetings of the Board of Directors may be held at the registered office of the corporation or at such other place or places, either within or without the State of Oregon, as the Board of Directors may from time to time designate. The annual meeting shall be held without notice at the registered office of the corporation or at such other time and place as the Board of Directors shall designate by written notice. In addition to the annual meeting, there shall be regular meetings of the Board of Directors held, with proper notice, not less frequently than once each calendar quarter. 3.5 Special Meetings. Special meetings of the Board of Directors may be called at any time by the President or upon written request by any two directors. Such meetings shall be held at the registered office of the corporation or at such other place or places as the directors may from time to time designate. 3.6 Notice. Notice of all special meetings of the Board of Directors (and of all regular meetings other than the annual meetings to be held at the place and time designated in Section 4.4) shall be given to each director by three (3) days' prior service of the same by fax, email, letter, or personally. Such notice need not specify the business to be transacted at, nor the purpose of, the meeting. 3.7 Quorum. A majority of the whole Board of Directors shall be necessary and sufficient at all meetings to constitute a quorum for the transaction of business. 3.8 Waiver of Notice. Attendance of a director at a meeting shall constitute a waiver of notice of such meeting, except where a director attends for the express purpose of objecting to the transaction of any business because the meeting is not lawfully called or convened. A waiver of notice signed by the director or directors, whether before or after the time stated for the meeting, shall be equivalent to the giving of notice. 3.9 Registering Dissent. A director who is present at a meeting of the Board of Directors at which action on a corporate matter is taken shall be presumed to have assented to such action unless the director shall file a written dissent or abstention to such action with the person acting as the secretary of the meeting before the adjournment thereof, or shall forward such dissent by registered mail to the Secretary of the corporation immediately after the adjournment of the meeting. Such right to dissent or abstain shall not apply to a director who voted in favor of such action. 3.10 Executive and Other Committees. The Board of Directors may appoint, from time to time, from its own number, standing or temporary committees consisting each of no fewer than two (2) directors. Such committees may be vested with such powers as the Board may determine by resolution passed by a majority of the full Board of Directors. No such committee shall have the authority of the Board of Directors in reference to amending, altering, or repealing these Bylaws; electing, appointing, or removing any member of any such committee or any director or officer of the corporation; amending the Articles of Incorporation; adopting a plan of merger or adopting a plan of consolidation with another corporation; authorizing the sale, lease, or exchange of all or substantially all of the property and assets of the corporation other than in the ordinary course of business; authorizing the voluntary dissolution of the corporation or adopting a plan for the distribution of the assets of the corporation; or amending, altering, or repealing any resolution of the Board of Directors which by its terms provides that it shall not be amended, altered, or repealed by such committee. All committees so appointed shall keep regular minutes of the transactions of their meetings and shall cause them to be recorded in books kept for that purpose in the office of the corporation. The designation of any such committee and the delegation of authority thereto, shall not relieve the Board of Directors, or any member thereof, of any responsibility imposed by law. 3.11 Remuneration. No stated salary shall be paid directors, as such, for their service, but by resolution of the Board of Directors, a fixed sum and expenses of attendance, if any, may be allowed for attendance at each regular or special meeting of such Board; provided, that nothing herein contained shall be construed to preclude any director from serving the corporation in any other capacity and receiving compensation therefor. 3.12 Loans. No loans shall be made by the corporation to any director. 3.13 Removal. Any director may be removed at any time, with or without cause, by the affirmative vote of two-thirds (2/3) of the votes cast by members having voting rights with regard to the election of any director represented in person or by proxy at a meeting of members at which a quorum is present. 3.14 Action by Directors without a Meeting. Any action required or permitted to be taken at a meeting of the directors, or of a committee thereof, may be taken without a meeting by a written consent setting forth the action so to be taken, signed by all of the directors, or all of the members of the committee, as the case may be, before such action is taken. Such consent shall have the same effect as a unanimous vote. Any such action may also be ratified after it has been taken, either at a meeting of the directors or by unanimous written consent. ARTICLE IV 4.1 Designations. The officers of the corporation shall be a President, a President–Elect, a Vice-President, a Secretary and a Treasurer, and such Assistant Secretaries and Assistant Treasurers as the Board may designate. All officers shall be elected for terms of two years by the Board of Directors except that the President-Elect shall be elected for a term at the discretion of the Board of Directors. 4.2 The President. The President shall preside at all meetings of the Board of Directors, shall have general supervision of the affairs of the corporation, and shall perform such other duties as are incident to the office or are properly required of the President by the Board of Directors. 4.3 Vice Presidents. During the absence or disability of the President, the Executive Vice Presidents, if any, or any of the Vice Presidents in the order designated by the Board of Directors, shall exercise all the functions of the President. Each Vice President shall have such powers and discharge such duties as may be assigned to him or her from time to time by the Board of Directors. 4.4 Secretary and Assistant Secretaries. The Secretary shall issue notices for all meetings, except for notices of special meetings of the Board of Directors which are called by the requisite number of directors, shall keep minutes of all meetings, shall have charge of the seal and the corporate books, and shall make such reports and perform such other duties as are incident to the office, or are properly required of the Secretary by the Board of Directors. The Assistant Secretary, or Assistant Secretaries, in the order designated by the Board of Directors, shall perform all of the duties of the Secretary, and at other times may perform such duties as are directed by the President or the Board of Directors. 4.5 The Treasurer. The Treasurer shall have the custody of all monies and securities of the corporation and shall keep regular books of account. The Treasurer shall disburse the funds of the corporation in payment of the just demands against the corporation or as may be ordered by the Board of Directors (taking proper vouchers for such disbursements) and shall render to the Board of Directors from time to time as may be required, an account of all transactions undertaken as Treasurer and of the financial condition of the corporation. The Treasurer shall perform such other duties as are incident to the office or are properly required by the Board of Directors. The Assistant Treasurer, or Assistant Treasurers, in the order designated by the Board of Directors, shall perform all of the duties of the Treasurer in the absence or disability of the Treasurer, and at other times may perform such other duties as are directed by the President or the Board of Directors. 4.6 Executive Director. The Board may select an Executive Director who shall be responsible for the administration and conduct of the business and affairs of the corporation pursuant to guidelines established by the Board. The Executive Director shall have full authority for direction of the employees of the corporation, if any. The Executive Director, if selected, may be compensated for his or her services in that capacity in such amount and manner as the Board of Directors shall determine. 4.7 Delegation. If any officer of the corporation is absent or unable to act and no other person is authorized to act in such officer's place by the provisions of these Bylaws, the Board of Directors may from time to time delegate the powers or duties of such officer to any other officer or any director or any other person it may select. 4.8 Vacancies. Vacancies in any office arising from any cause may be filled by the Board of Directors at any regular or special meeting of the Board. 4.9 Other Officers. The Board of Directors may appoint such other officers or agents as it shall deem necessary or expedient, who shall hold their offices for such terms and shall exercise such powers and perform such duties as shall be determined from time to time by the Board of Directors. 4.10 Loans. No loan shall be made by the corporation to any officer. 4.11 Term-Removal. The officers of the corporation shall hold office until their successors are chosen and qualified except that the President shall be elected for a term of two (2) years and the President-Elect shall be elected for a term of two (2) years. The President shall not serve consecutive terms whether by election or appointment but may serve as President multiple times. Upon the expiration of the second (2nd) year term of the President, the President-Elect shall immediately succeed the President at the next scheduled regular or special meeting of the Board of Directors of the corporation. At this next regularly scheduled or special meeting of the Board of Directors a new President-Elect shall be voted to hold office for the next succeeding two (2) years. Any officer or agent elected or appointed by the Board of Directors may be removed at any time, with or without cause, by the affirmative vote of a majority of the whole Board of Directors, but such removal shall be without prejudice to the contract rights, if any, of the person so removed. 4.12 President-Elect. The President-Elect shall have such powers and discharge such duties as may be assigned to him or her from time to time by the Board of Directors. 4.13 Bonds. The Board of Directors may, by resolution, require any and all of the officers to provide bonds to the corporation, with surety or sureties acceptable to the Board, conditioned for the faithful performance of the duties of their respective offices, and to comply with such other conditions as may from time to time be required by the Board of Directors. ARTICLE VI The monies of the corporation shall be deposited in the name of the corporation in such bank or banks or trust company or trust companies as the Board of Directors shall designate, and shall be drawn from such accounts only by check or other order for payment of money signed by such persons, and in such manner, as may be determined by resolution of the Board of Directors. ARTICLE VII The corporate seal of the corporation, if any, shall be in such form and bear such inscription as may be adopted by resolution of the Board of Directors, or by usage of the officers on behalf of the corporation. ARTICLE VIII Indemnification of Officers, Directors, Employees, and Agents The corporation shall indemnity its officers, directors, employees, and agents to the greatest extent permitted by law. The corporation shall have power to purchase and maintain insurance on behalf of any person who is or was a director, officer, employee, or agent of the corporation or who is or was serving at the request of the corporation as an officer, employee, or agent of another corporation, partnership, joint venture, trust, other enterprise, or employee benefit plan, against any liability asserted against such person and incurred by such person in any such capacity or arising out of any status as such, whether or not the corporation would have the power to indemnity such person against such liability under the provisions of this Article. ARTICLE IX The corporation shall keep correct and complete books and records of account and shall keep minutes of the proceedings of its Board of Directors; and shall keep at its registered office or principal place of business, or at the office of its transfer agent or registrar, a record of its directors, giving the names and addresses of all directors. ARTICLE X The Board of Directors shall have power to make, alter, amend, and repeal the Bylaws of this corporation; provided, that the Board will not approve any such alteration, amendment, or repeal that would adversely impact the rights of any class of members unless such alteration, amendment, or repeal shall first have received the approval of two-thirds (2/3) of the board.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Q: Prebid not render ad with configurated sizes I'm testing Prebid on mobile devices. In my AdUnit, I have defined dimensions as follows: Prebid parameters But, I get ads with different dimensions: Prebid sizes It seems to me that advertisers don't understand that the ad is displayed on a mobile device, maybe that's the problem. Maybe there is a parameter I forgot. I played my auctions in an iFrame, maybe that's the problem. I use 4.25 version. Please tell me if my post is incorrect or incomplete, it's my first post on stackoverflow. Thank a lot for your help. A: The problem is solved. You can see details here: https://github.com/prebid/Prebid.js/issues/6307. If you use ImproveDigital adapter just add improvedigital: {usePrebidSizes: true} in pbjs.setConfig pbjs.setConfig({ improvedigital: {usePrebidSizes: true} }); My full sample here : The HTML page : <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <script type="text/javascript" src="testmobile.js"></script> </head> <body> <div id="b48fef10-6f72-4f83-9a91-77c42069bd87"> </div> </body> </html> The javascript code : /** add your prebid dll here or in html file **/ let adUnits = []; let adUnit = { code: "b48fef10-6f72-4f83-9a91-77c42069bd87", mediaTypes: { banner: { sizes: [[300,100],[320,100],[320,50],[300,50]] } }, bids: [ { bidder:"onetag", params:{ pubId:"xxxxxxxxxxxxxxxxx" } }, { bidder:"appnexus", params: { placementId:"xxxxxxxxxxxxxxxxx" } }, { bidder:"improvedigital", params: { placementId:"xxxxxxxxxxxxxxxxx" } }] }; adUnits.push(adUnit); pbjs.que.push(function () { pbjs.setConfig({ debug: true, improvedigital: {usePrebidSizes: true} }); pbjs.addAdUnits(adUnits); pbjs.requestBids({ bidsBackHandler: function (bidResponses) { var winningBids = []; let ad = pbjs.getHighestCpmBids("b48fef10-6f72-4f83-9a91-77c42069bd87"); if (ad && ad.length > 0) { let idIFrame = "b48fef10-6f72-4f83-9a91-77c42069bd87frame"; let iFrame = "<iframe id='" + idIFrame + "'" + " FRAMEBORDER=\"0\"" + " SCROLLING=\"no\"" + " MARGINHEIGHT=\"0\"" + " MARGINWIDTH=\"0\"" + " TOPMARGIN=\"0\"" + " LEFTMARGIN=\"0\"" + " ALLOWTRANSPARENCY=\"true\"" + " WIDTH=\"0\"" + " HEIGHT=\"0\">." + " </iframe>" document.body.innerHTML += '<div id=b48fef10-6f72-4f83-9a91-77c42069bd87>' + iFrame + '</div>'; var iframe = document.getElementById(idIFrame); var iframeDoc = iframe.contentWindow.document; try { pbjs.renderAd(iframeDoc, ad[0]['adId']); } catch (e) { console.log(e); } winningBids = pbjs.getAllWinningBids(); console.log(winningBids); } else { console.log("No bids"); }; }, timeout: 2000 }); });
{ "redpajama_set_name": "RedPajamaStackExchange" }
Maxïmo Park announce first album in three years with lead cut "Baby, Sleep" By Cerys Kenneally / 15 October 2020, 12:46 BST Photo by Em Cole Maxïmo Park have returned to share news of their forthcoming album Nature Always Wins, and have unveiled new track "Baby, Sleep" as the lead single. "Baby, Sleep" lands after last month's "Child Of The Flatlands" track, and vocalist Paul Smith describes the song as "a light-hearted look at the surreal nature of sleep-deprivation, and the way it distorts normality in a capitalist society." Nature Always Wins will be Maxïmo Park's first LP in three years after 2017's Risk To Exist. Smith, guitarist Duncan Lloyd and drummer Tom English recruited Atlanta producer Ben Allen (Animal Collective, Deerhunter) as their temporary fourth member for Nature Always Wins, and ended up finishing the LP virtually from two different continents due to the coronavirus pandemic. Discussing the album, Smith says, "I'm so happy we were able to make this album during lockdown, as it's been a challenging time for everyone. After almost four years since Risk To Exist, we wanted to explore new musical territory (for us) without sacrificing our trademark melodic twists and heartfelt lyrics. As always, the passing of time looms large, although the songs contain more affection for the past than before, and there are occasional hints of the fractious, divided time that we live in." Partly Of My Making Versions Of You Baby, Sleep Ardour (featuring Pauline Murray) Meeting Up Why Must A Building Burn I Don't Know What I'm Doing The Acid Remark Feelings I'm Supposed To Feel Child Of The Flatlands "Baby, Sleep" is out now. Maxïmo Park's Nature Always Wins album will land via Prolifica Inc on 26 February 2021, and is available to pre-order now. They're due to play London's EartH on 9 June 2021. Tickets go on general sale from 9am BST on 23 October. Safety and solace. Echo Lake on turning chaos into creativity with new record 'Era'. Track By Track: Ringo Deathstarr on Pure Mood The Seven Foot Tall Post-Suicidal Feel Good Blues
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
t h e i n t e r n a t i o n a l b a c c a l a u r e a t e a t w e l l i n g t o n c o l l e g e a g e s m y p a g e s d i p l o m a t h e i n t e r n a t i o n a l b a c c a l a u r e a t e a t w e l l i n g t o n c o l l e g e a g e s 1 3 – 1 6 m y p a g e s 1 6 – 1 8 d i p l o m a Dr Anthony Seldon m a s t e r MA, PhD, FRSA, MBA, FRHisS i n t r o d u c t i o n b y t h e m a s t e r or most children in this country education has become a utilitarian treadmill of tests and public examinations. Schools are evaluated solely by their academic results. Assessment has come to determine the curriculum, and right and wrong answers—facts—have come to dominate exams. For most pupils and parents there is no choice and no escape from the restrictions of the National Curriculum and the drumbeat of s and Wellington College is now offering a real and liberating alternative. From September 2009 we are going to provide the International Baccalaureate Middle Years Programme ( ib myp ) to all of our pupils, 13– 16. The Third Form (13 year olds) will follow an course which will prepare them for s within the in the Fourth and Fifth Forms (14 –16 year olds). In the Sixth Form our pupils will be offered the Diploma Programme or a rich choice of We believe that the provides pupils with excellent preparation for pupils for universities and for the world they will go on to shape. We need to educate minds as well as teach facts; we need to develop thinking skills rather than just teach to exam requirements. Graduates of Wellington College will be competing in an increasingly global market place. Thus, working in partnership with the internationally respected International Baccalaureate Organisation, we will offer a curriculum that suits all of our pupils: it will be innovative, it will stretch and challenge, but it will also instil deep within each boy and girl the values that parents have come to treasure at Wellington College. All pupils will derive real and enriching benefits from being part of an World School. rom this September all of the pupils entering our Third Form will study for the . The curriculum, tailored by Wellington College's staff to meet the aspirations of an increasingly academically gifted intake, is varied and stimulating, offering rich breadth and depth. It will provide an excellent transition between prep schools and the middle years at Wellington, whilst developing strong cross-curricular links and study skills. Within the programme, all pupils will do a minimum of two s (Maths and English) while those with specialist interests or who prefer a more traditional approach may do additional s (up to 9 in total) within the curriculum framework. Those choosing the Maths and English only) would gain the breadth, balance, cross-curricular links, personal project, school- based courses and other advantages of the . They would thus gain a full certificate in all of their subjects plus s in Maths and English. We recognise, however, that there will be some who would prefer to choose a course and they will be able to do this within an framework. They will be given the opportunity to gain up to nine s with certification in subjects. Obviously the more s a pupil does, the more diluted their course; we believe that quite quickly, the overwhelming majority, and perhaps all, of Wellington's pupils will opt for the full at the end of the Third Form. A changing curriculum for a changing world is an international qualification for pupils aged 13 to 16, with a proven international reputation for excellence and for admission to university. It is offered by the International Baccalaureate Organisation, which also provides the Diploma Programme that Wellington runs alongside Levels in the Sixth Form. offers: A broad and balanced curriculum structure based on the octagonal diagram opposite The opportunity to design our own course content and forms of assessment External moderation and certification of our pupils' work Internationally recognised grading for university entry 's values: internationalism, interdisciplinarity, social awareness Certification of grades by an educational organisation which is universally respected and free of government interference. All pupils must meet minimum requirements in each of the eight areas below, though within areas like the humanities, languages, sciences and the arts, they may take several subjects, ensuring breadth while allowing specialisation. We envisage continuing to offer all current subjects and we have devised timetable models that would satisfy the requirements while preserving and enhancing the range and flexibility of our current option choice provision. Each course will be planned collaboratively and The IB Middle Years Programme linked through the 's Areas of Interaction. So, for example, key concepts found in History can be shared in Science, allowing pupils to have their learning reinforced in different contexts. They will make connections, establish patterns, and learn that education does not exist in self-contained modules: understanding should flow between subjects. In addition, we will continue to run our Well-being programme and have begun planning for a new Wellington-based course which introduces pupils to the history of thought, philosophy, art, politics, and science through practical problem solving and critical thinking. The Harkness method of teaching, now standard in many Sixth Form subjects, will be introduced to our younger pupils, providing them with the opportunity to benefit from more enquiry-based learning. The crucial difference between s and the is that the former imposes course content and external assessment, while the latter leaves schools free to determine their own course content and means of assessment. School programmes are monitored by the and internal assessment is moderated against that of all schools around the world offering the , giving pupils recognised grades in each subject at the end of their programme. Quite simply: the trusts the schools to provide courses which suit their needs, but the organisation also ensures that standards are maintained. The pupils at Wellington enjoy their lessons o, why follow the ? Unlike s, the is highly adaptable, allowing schools like Wellington to design their own courses with stimulating and differentiated content to suit their own pupils' aptitudes and interests. Schools are also able to assess pupils in is more than just knowing varied ways and at different stages rather than having to push them through a one-size-fits-all examination process that encourages teaching to the test. It allows the Wellington community (staff, pupils, and parents) to design a middle school curriculum which works for us and which best prepares our pupils for life in the Sixth Form and beyond. It will be academically rigorous, and, importantly, at the end of the Fifth Form our pupils' work will be moderated and certified, using clear and transparent criteria provided by the , providing each pupil with a truly world-class qualification. Pupils will still be taught 'traditional' subjects, and each will contain essential 'building blocks' of knowledge. But the approaches to teaching A Harkness 'table' (oval table where pupils take responsibility for their own learning) in an economics lesson. Spot the teacher (he's the one looking puzzled). organisation is the market leader in providing high- quality internationally-recognised qualifications. It has three programmes of study: The Diploma Programme Available to 16 –19 year olds; running in 1,857 schools The Middle Years Programme Available to 11–16 year olds; running in 679 schools. The Primary Years Programme Available to 3–12 year olds; running in 491 schools The growth in all three programmes is rapid and continuing: the number of schools offering programmes will rise to 10,000 within twelve years. The brand is strong and its reputation assured; growth in all three programmes is particularly significant in the United Kingdom, with a growing number of independent schools offering one or more of its programmes. This growth is matched in the state sector. Additionally, and importantly, its academic standards are set very high and it has experienced zero grade inflation. Wellington College started offering the Diploma in 2008, and with real success: 25% of its Lower Sixth pupils opted to do it, and numbers are growing. It offers breadth (each pupil does six subjects, plus a core which includes an extended essay and a critical thinking course) and depth (within the six subjects three are taken at higher level). Emphasis is placed The IB and Wellington: a world class education and learning will be new: teachers from different disciplines will plan courses together, assessment will be continuous and formative, enabling us to be more sophisticated and sensitive in measuring our pupils' progress; for those doing predominantly the programme there will be significantly fewer final examinations, allowing us to gain valuable teaching time to develop real and lasting understanding. And each pupil will engage in open-ended, problem-solving activities, investigations, organized debates, hands-on experimentation, peer learning, analysis and reflection, orals, and essays: a rich mix of experiences for an increasingly diverse age. At the heart of the there is a commitment to understanding, rather than simple learning. To understand the most complex real-life issues we also need to explore the connection between subjects. At Wellington we believe that in the future the ability to think critically, to question the wealth of information available, to be adaptable to a range of shifting circumstances, will be the mark of a 'good' education. The allows Wellington to do just that: we will instil in our pupils a greater desire to learn and inquire, and to reflect on how they learn. w h at d o u n i v e r s i t i e s t h i n k o f t h e m y p ? The provides pupils with a qualification that is recognised by British and international universities as being of a standard at least equivalent to s. We have polled dozens of universities and colleges, including all members of the Russell Group of Universities and all higher education institutions to which Wellingtonians have gone on to in recent years. All who have responded say that they are familiar with the and that they have established procedures for making offers to pupils who present with qualifications other than s. Pupils will not be disadvantaged and some universities have expressed preference for the academic values of the . Dr Geoff Parks, Director of Undergraduate Admissions at Cambridge University: "I would have thought that the proposed changes must be to the benefit of your pupils educationally and that should then benefit them in their university applications. It seems clear that for many pupils the current standard educational provision in years 9 –11 is decidedly uninteresting, uninspiring and unchallenging and your proposal should provide a much more engaging, stimulating, stretching and generally satisfactory experience". Mike Nicholson, Director of Undergraduate Admissions at Oxford University: "Candidates who wish to be stretched should, in my view, take the MYP. The rigour and work ethic it encourages will assist them strongly if they wish to progress to a degree that will require them to really engage with their subject discipline". on independent learning, with final examinations at the end of the Upper Sixth, just like the old, pre-modular -Level. Diploma and the share a common philosophy: that pupils should be inquirers, open minded, knowledgeable; they should be risk-takers, communicators; and they should also be caring, reflective, principled thinkers. Such qualities are embedded in the curriculum and promoted in every area of school life. Above all, the students who study an programme gain a balanced, holistic education which future-proofs them in a world which is undergoing rapid change. extended essay theory of knowledge creativity, action, service group 1 language a1 group 6 the arts group 3 individuals & societies group 5 mathematics & computer science group 2 second language group 4 experimental sciences The IB diploma have some strengths, but their content is heavily prescriptive, they are too focused on examinations, and subjects are too separate from each other. s encourage teaching to exams rather than learning to learn. Our new curriculum would be designed to ensure pupils have a solid core of knowledge and skills, but also to stimulate curiosity and challenge increasingly capable pupils provide more opportunities for accelerated, independent and extended learning integrate the curriculum, both vertically and horizontally, linking years and subjects teach pupils how to learn and to see their education holistically relieve the pressure of externally imposed assessments and provide better intellectual preparation for both Levels and the in the Sixth Form i s w e l l i n g to n g o i n g f u l l i b ? No. Wellington is proud to offer the Diploma alongside Levels in the Sixth Form and we intend to continue running both for the foreseeable future. We know that every pupil has individual aptitudes and interests, and we take great care to help all pupils choose the pathway and subjects that suit them best. We feel that the flexibility of the will better suit our pupil-centred ethos and will better prepare our pupils for senior study, whichever route they take. w h y c h a n g e n ow ? The current presumption that pupils should present large numbers of s to universities is dissolving as confidence in the new s to be launched nationally in September 2009 is eroded by critical announcements Professor Howard Gardner, Harvard University, the leading educational psychologist in the world: "The more that I learn about the , the more impressed I am with the dedication and forward-thinking of its leadership. Spurning the consensual wisdom (which is, all too often, the consensual folly) of state ministers of education, the builds on the most important knowledge, wisdom, and ways of knowing from the past; engages seriously with the trends, promises, and tribulations of the 21st century; and, most importantly, ponders how we might achieve the kind of world in which we would all like to live—sane, peaceful, sustainable. Instead of posing the question "How much more knowledge can we test for ? " the asks "To what ends shall we put our knowledge ? " h ow i s t h e m y p a s s e s s e d ? Assessment is continuous and school-based using a wide variety of formative and summative techniques, including presentations, assignments, projects, practical experiments, tests, examinations, and so on. Final results are awarded by the end of the Fifth Form and pupils' portfolios are moderated externally by the . Pupils then receive certification of their results in each subject. Results are graded from 1 to 7 (with 7 being the highest grade) and are recognised by universities in the and abroad. w h y d o e s w e l l i n g to n wa n t to a d o p t t h e m y p ? There has been much academic change at Wellington in recent years: the Sixth Form curriculum has altered dramatically with the introduction of new Diploma, our expectations have risen, the shape of the timetable has changed, the ways in which we teach have become more varied, the ability levels of our pupil intake have risen sharply, and our results at all levels have improved substantially. The government's new s, which are being introduced nationwide from September 2009, MYP returned enthused and greatly excited. We strongly support Wellington on taking this initiative, and feel sure it will be of great benefit to our pupils." Roger Jones, St George's, Windsor 'MYP ? Heavens this could be dangerous ! A generation of boys and girls encouraged to think for themselves, to be creative, to problem solve, to work together, to view themselves as part of the world not as the centre of it.' Nigel Taylor, Amesbury School "This is an exciting and innovative development from Wellington which I am sure will be of great interest to prep school parents." Mark Johnson, Cheam School w h at d o pa r e n t s t h i n k ? Parental views expressed to date have been very positive. After receiving a positive response from parents to an initial survey, we invited all 2009 and 2010 intake parents to attend either of two presentations on the in January. Parents were surveyed after the events, and of the parents who are sending their children to Wellington in 2009 97% were positive about the ; of those sending children to us in 2010 100% were positive. w h at d o e s bu s i n e s s t h i n k ? We have extensively polled businesses about the and again their response was overwhelmingly positive, not the least because of its emphasis on thinking skills and individual initiative. Sir Michael Rake, Chairman of the Commission for Employment and Skills and Group, says: diploma and offer a different and modern approach to the traditional diet of Levels and s and I welcome the initiative by Wellington College. I believe that Levels are too specialised for today's employment, and s also don't provide the right preparation, whereas offer a broader range of skills and encourage children to think for themselves." by a number of high profile schools recently. As the educational landscape changes we believe that it is therefore prudent to offer an attractive, credible and educationally rigorous alternative. Of the current alternatives to s, Wellington favours the values, flexibility and established academic record of the Organisation and the w h e n wo u l d c h o i c e s h av e to b e m a d e ? Families would choose their mix at Easter time in the Third Form, which is the time at which pupils currently choose their subject options. The first cohort will choose in March 2010. w h at d o p r e p s c h o o l s t h i n k ? The heads of prep schools we have consulted have been enthusiastic about the change. Comments we have received include: "I am delighted that Wellington is taking the imaginative and creative step of taking the s. In my view this can only enhance the learning experience of all the pupils." John Baugh, The Dragon School is an excellent course and I applaud Wellington for replacing a stultifyingly boring examination with it." Richard Foster, Windlesham House s are widely acknowledged to be failing our most able pupils. I welcome Wellington's move to offer the Middle Years Programme as a stimulating alternative at the age of 14 and have little doubt that where Wellington leads, others will follow." Ben Thomas, Thomas's Prep Schools "All the St George's parents who attended the recent information evening on For more information about the MYP at Wellington please contact: dr david james di r ec tor of ib w e l l i n g t o n c o l l e g e c r o w t h o r n e , b e r k s h i r e r g 4 5 7 p u [email protected] wellingtoncollege.org.uk Brochure designed by Jules Akel "Schools should be joyful and delightful places, full of curiosity, stimulus, enrichment. Our aim, with these powerful curriculum changes, and the choices we are now offering at 13– 16 and 16 –18 is to help Wellington College become exactly what schools should be." Dr Anthony Seldon, Master m u l t i v e n o u s N u r s i n g C a r e G u i d e l i n e s L U M E N M U L... • in questionable cases the catheter may be changed over a guide wire and the tip and intracutaneous segment cultured - if the catheter cultures are negative the newly placed catheter R E G I O N A L C O N F E R E N C E G L O B A L M E N T A L H E A L T H : F R O... We are so excited to welcome you to the 2019 American Mock World Health Organization Regional Conference held in Oklahoma City, Oklahoma on October 25th and C O N S E N T I N G A D U L T S? T A C K L I N G T H E C H A L L E N G E S O F E... If a recipient withdraws consent to receive electronic forms and the withdrawal takes effect before the form is sent, a paper form must be provided.. A paper form furnished after the C E R T A I N T E E D O R G A N I C S H I N G L E S C L A S S A C T I O N S E T... Settled Claim does not include: (1) any claims for damages to the interior part of a building below the roof deck suffered on account of damage to the Organic Shingles; (2) any claims W H I T E P A P E R : C O L L A T E R A L O P T I M I Z A T I O N - B E Y O N D... Cheapest to deliver collateral allocation involves assigning a collateral cost to different asset types.. Each firm's collateral cost matrix is unique to that firm and is based on W H I T E P A P E R : B U Y S I D E C O L L A T E R A L M A N A G E M E N T - C... They show the major increase in complexity in the collateral management process for the buyside, who now face trading via multiple FCMs/ Clearing Brokers and clearing trades through L A G U A R D I A C O M M U N I T Y C O L L E G E C I T Y U N I V E R S I T Y O... Upon successful completion of all of the above requirements, the Registered Nursing Program will evaluate and select students applying for the LPN to RN Bridge course based on GPA H Y P E R I O N F I N A N C I A L D A T A Q U A L I T Y M A N A G E M E N T R E... If a backup server is specified, when you create, modify, add, or remove a FDM application, the application configuration file \\Hyperion\ FDM\ Shared Components\ Config\ R U L E S A N D R E G U L A T I O N S O F C H A R L O T T E S V I L L E A R E A... The exclusive right to sell listing is the conventional form of listing submitted to the Multiple Listing Service, in that the seller authorizes the listing C O U R S E D E S C R I P T I O N W I T H S T U D E N T O U T C O M E S L O R A... Value scales (item analysis), daily reaction papers, developmental interview assignments and reflective paper evaluated by rubric This course also addresses the following LCCC B A R B A R A S H A L I T & C A M E R O N N O L A N M E N T A L H E A L T H L E...  Step 2: if the medical practitioner decides that the person meets the grounds for an involuntary order, they may make a "recommendation" that the person be further examined either W H I T E P A P E R : C O L L A T E R A L O P T I M I S A T I O N I N A C E N T... This can range from pledging the cheapest to deliver collateral for each trade to more sophisticated allocation decisions on which trades are least expensive based on the collateral P a s s l o g i x A L e a d e r i n S i n g l e S i g n - O n T e c h n o l o g... Subcategories of the IAM market include Web single sign-on (WSSO) and federated single sign-on (FSSO); host/enterprise SSO; user provisioning, including granular authorization C L A I M S M A N A G E M E N T & M I T I G A T I O N - T I P S T O H E L P P R... • Take photos of license tags, ID numbers, unique marking of autos and vehicles belonging to persons who claim to have witnessed the accident, but will not identify themselves. • Take D o n o r R e l a t i o n s h i p M a n a g e m e n t S o f t w a r e, C a m p a... S t T h e r e s a I n t e r n a t i o n a l C o l l e g e H E L S I N K I U N I V E R S I T Y O F T E C H N O L O G Y P M & R G - P R O D... To c o m p e t e in t o d a y s r e t a i l e n v i r o n m e n t, y o u n e e d... M A N A G I N G C A P I T A L F L O W S T O E M E R G I N G M A R K E T S C O U... C o l l e g e P a r t i c i p a t i o n, P e r s i s t e n c e, G r a d u a t i... Priscum N E W S L E T T E R O F T H E P A L E O N T O L O G I C A L S O C I E T... L O S A N G E L E S S A N F R A N C I S C O N E W Y O R K B O S T O N C H I C A... W H I T E P A P E R : S Y N T H E T I C F I N A N C E O P E R A T I N G M O D E... B E T T E R T O G E T H E R : A S I N G L E H C M A N D C A N A D I A N P A Y R...
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
M+H Architects has a proven reputation for successfully executing projects smoothly, on time, and within budget, across the country. We pride ourselves in being able to pro-actively communicate with local jurisdictions of all sizes. We understand their requirements, deadlines and expectations in a manner that yields a smooth, timely process. With projects underway or completed in 30 states, M+H is quite adept at working outside the St. Louis area. We are currently licensed to practice architecture in 40 states. We are prepared to apply for registration in any other state where opportunities arise.
{ "redpajama_set_name": "RedPajamaC4" }
Cancer is a serious subject, but anyone who looks into a child's eyes may be more hopeful when it comes to this disease. It's a fact that around 16,000 children are diagnosed with cancer each year, reports WSAV news. These cancers vary in type, and they do include lung cancer. Learn more about mesothelioma as Childhood Cancer Awareness Month continues this September. There's hope for children around the world as science fights this disease. Mesothelioma is a specific type of lung cancer. It affects the pleural lining within the respiratory system. This lung cancer doesn't stem from years of smoking cigarettes, however. It's linked to asbestos exposure. Fibers from asbestos installed on ships, airplane and within buildings were constantly inhaled into the lungs by unsuspecting employees. After many years, the fibers that were lodged in the lungs started to mutate cells. Mesothelioma was the result. This disease impacts adults more so than children. The cases that do impact children, however, will pull at the heart strings. No child should have to deal with this serious ailment. The Roswell Park Comprehensive Cancer Center reports that mesothelioma isn't in the top-five cancers for children. This fact, however, doesn't mean that the ailment shouldn't be pursued with great focus. The children who do develop mesothelioma have a challenge ahead of them. Their lungs are still developing as children. The cancer tumors create a barrier to healthy breathing and respiratory ease. With more research, eradicating mesothelioma from children may be possible in the next few decades. Mesothelioma has another feature that's often overlooked. If a child has absolutely no history of asbestos exposure, it's possible for genes to play a role. As Springer Nature Limited reports, there are many genes associated with cancers. Lung cancer may be one of them. The BAP1 gene has been closely analyzed over the past few years. This gene might hold the key to solving some bouts with lung cancer. Children may benefit the most from this research. Children are tough individuals. Their youth may seem to have a power all of its own. However, the survival rates for mesothelioma in children are just as serious as adults. Remission has only occurred in a few individuals. It lasts less than five years as well. Science is working on both cancer prevention and treatment. Children who're at high risk for asbestos exposure, such as from parents' workplaces or tainted toys, must be evaluated more often than other children. Early warning signs of cancer must be commonplace knowledge among parents. Overlooking certain signs can lead to a serious diagnosis. Catching cancers in their early stages will always give children a better chance at a healthier life than before. Every September, Childhood Cancer Awareness Month is observed. At some point in the future, the world would like to change this month into a celebration of a cancer cure. Until then, children and adults together will continue the fight against cell mutation and disease progression.
{ "redpajama_set_name": "RedPajamaC4" }
Q: Design Pattern for .Net data reader What do you think the "ideal" design pattern for reading a certain file type into my application. I want to be able to reuse the code in various places, so clearly I want to have this in a separate dll, however although I have no problem passing a filename or stream into the code, what's the recommended design pattern for handling the read data. Reading all the data into an array and passing this out is obviously not ideal from a memory management point of view, but the only other way I can think of doing it is by raising events when a record is read, however this doesn't feel "right" in that I would be worried that some of the events could go astray. I'm sure there's a really slick way of doing this, but I can't for the life of me think of it. Thanks A: What is the format? If it is text, passing in a TextReader would be ideal; and for xml, an XmlReader. If it is arbitrary binary, pass in a Stream. For large data, the ideal approach where possible is to read the data in a non-buffered way - i.e. don't load it all into memory. Iterator blocks can be useful here, for example here's a silly example that shows reading lines (but it could just as easily yield return objects built from data in a stream): public IEnumerable<string> ReadLines(TextReader source) { string s; while ((s = source.ReadLine()) != null) yield return s; } obviously in the general case a lot more processing may be necessary per item! The caller now has a lazily-spooling, non-buffered source of your data, for example: using(var file = File.OpenRead(path)) { foreach(var customer in YourSpiffyParser(file)) DoSomethingFun(customer); } And handling stream/textreader etc allows them to use it in a decorator chain with things other than files; network streams, in-memory streams, compression/crypto streams, etc. A: It's difficult to define something so general. You would have to specify more what you really need, or the file type. Then you can have a look at the .NET Framework itself, there are a lot of "XXXReader" classes, for example: * *BinaryReader *TextReader *StreamReader *StringReader *XmlReader *XmlTextReader *IDataReader *EventLogReader *XamlReader *EntityDataReader And each one is really different from the others... Some are abstract, some aren't, etc...
{ "redpajama_set_name": "RedPajamaStackExchange" }
VANCOUVER, BRITISH COLUMBIA--(Marketwired - March 19, 2014) - Choice Gold Corp. (CSE:CHF) ("Choice") is pleased to announce that it has entered into a tripartite Letter of Intent ("LOI") with International Enexco Inc. ("IEC") and Full Metal Minerals Ltd. (TSX VENTURE:FMM) ("Full Metal") to consolidate prospective copper assets in low-risk jurisdictions. Pursuant to the LOI, each Full Metal shareholder will receive 2.0 common shares of Choice and 1.0 listed share purchase warrant of Choice (each whole warrant a "Warrant"), with each Warrant exercisable for 5 years at a price of $0.10 per share (together, the "Full Metal Consideration") in exchange for the acquisition of Full Metal Minerals (U.S.A.) Inc. ("Full Metal US"), the wholly owned subsidiary of Full Metal that holds the Pyramid Copper Project in Alaska. Concurrently, each IEC shareholder will receive 8.8 common shares of Choice and 4.4 Warrants (collectively, the "Transaction") in exchange for the acquisition of Enexco International Inc. ("Enexco US"), the wholly owned subsidiary of IEC that holds the Contact Copper Project located in Nevada. It is anticipated that Choice will be renamed CopperBank Resources Corp. ("CopperBank") and complete a five for one share consolidation upon closing of the Transaction. In addition, prior to the completion of the Transaction, Choice is to complete a financing no less than $2 million for CopperBank. Together, CopperBank will hold both the Contact and Pyramid Copper Projects located in Nevada and Alaska respectively. Simultaneously, IEC has entered into a separate Letter of Intent with Denison Mines Corp. ("Denison") pursuant to which Denison will acquire all of the issued and outstanding common shares of IEC save for the Enexco US subsidiary holding the Contact Copper Project. 100% ownership of copper exploration and development assets in excellent mining jurisdictions, providing shareholders with excellent leverage to copper. Exposure to the advanced Contact Copper Project in Northern Nevada that has demonstrated strong economics at today's copper prices. Gianni Kovacevic, Choice Gold's Chairman states: "We are pleased to present this exciting, and in our minds timely opportunity, to our collective shareholder base. By creating this business model we aim to satisfy a consolidation demand from our global pool of natural resource investors and at the same time offer investors an efficient and well managed vehicle leveraged to higher copper prices. Furthermore, with our focused team we will work hard to create additional shareholder value by aggressively assessing various other projects available at this time. We see projects both inside and outside the public markets valued at less than the dollars put in the ground to delineate them, let alone their underlying net asset values. This is a great opportunity." Choice expects the Full Metal Transaction will take place by way of an asset purchase agreement or such other structure to be determined in a manner that is mutually agreeable from a tax perspective to Choice and Full Metal shareholders. Pursuant to the terms of the LOI, the Transaction is conditional upon a number of items, including, without limitation, the approval of the board of directors of each party and the entering into of a definitive Asset Purchase Agreement (the "FMM Purchase Agreement") between Choice and Full Metal for the sale of Full Metal US on the terms described above. Concurrently, Choice will enter into an Asset Purchase Agreement (the "IEC Purchase Agreement") with IEC for the sale of Enexco US on the terms described above. Full details of the Transaction will be included in the formal FMM Purchase Agreement, the IEC Purchase Agreement, and management information circular to be filed with regulatory authorities and mailed to shareholders in accordance with applicable securities laws. The Transactions will be subject to the approval of 66-2/3% of Choice, Full Metal, and IEC shareholders who vote at the meeting. The FMM Purchase Agreement and the IEC Purchase Agreement will provide that, if Choice, Full Metal or IEC completes an alternative transaction, within 12 months of this announcement, a breakup fee of $50,000 would be payable in certain conditions. Upon completion of the Transactions, it is anticipated that the Board of Directors of CopperBank will be comprised of Brad Armstrong, Dan Frederiksen and Todd Hilditch from IEC, along with Rob McLeod from Full Metal, and Gianni Kovacevic from Choice. It is expected that Rob McLeod will be appointed CEO of CopperBank and Bill Willoughby will be appointed President. The Transactions are expected to be completed in June 2014 or such later date as the parties may mutually agree. Choice Gold is a CSE (formerly CNSX) listed company in the business of acquiring and advancing late stage, high quality mineral deposits. Certain statements contained in this release constitute forward-looking information. These statements relate to future events or future performance. The use of any of the words "could", "intend", "expect", "believe", "will", "projected", "estimated", "anticipates" and similar expressions and statements relating to matters that are not historical facts are intended to identify forward-looking information and are based on Choice Gold Corp.'s (the "Company") current belief or assumptions as to the outcome and timing of such future events. Actual future results may differ materially. In particular, this release contains forward-looking information relating to the business of the Company, the Transaction, financing and certain corporate changes. Specifically, the LOI is subject to numerous conditions precedent to closing including shareholder approval, completion of a financing, and regulatory approvals. There are no assurances that all conditions precedent will be satisfied or waived or that the Transaction will be successfully completed on the terms and conditions contemplated herein or at all. Additionally, the LOI is subject to the Company completing an equity financing in an amount of $2 million and there are no assurances that the Company will be successful in completing such financing on commercially reasonable terms or at all. The forward-looking information contained in this release is made as of the date hereof and the Company is not obligated to update or revise any forward-looking information, whether as a result of new information, future events or otherwise, except as required by applicable securities laws. Because of the risks, uncertainties and assumptions contained herein, investors should not place undue reliance on forward-looking information. The foregoing statements expressly qualify any forward-looking information contained herein. The CSE has not reviewed and does not accept responsibility for the adequacy or accuracy of the content of this news release. About this company Choice Gold Corp.
{ "redpajama_set_name": "RedPajamaC4" }
It is a very good idea from you that you have decided to visit us again here on this website of ours games-kids.com, dear talented and skilfull players, because our marathon is far from being over and we still have a lot of surprises for you left and the truth is that the fact that you always return to us means that you really appreciate this games and this fact makes us really happy and motivated to work really hard to bring you all kind of interesting and beautiful games. Look that this new game is from the princess games category and we are sure you are going to appreciate it especially because we will have four very popular character and we are talking about Ariel and her boyfriend Eric and Rapunzel and her boyfriend Flynn and it seems that now that autumn is here they need your help to choose the best outfits for this weather. Have fun!
{ "redpajama_set_name": "RedPajamaC4" }
India Browse current inventory of this title By Winston S. Churchill First published in 1931 by Thornton Butterworth Limited, London "But step by step, as it is believed we are going to clear out or be thrust out of India, so this tremendous rivalry and hatred of races springs into life again. It is becoming more acute every day. Were we to wash our hands of all responsibility and divest ourselves of all our powers, as our sentimentalists desire, ferocious civil wars would speedily break out between the Moslems and the Hindus. No one who knows India will dispute this." (Speech of 18 March 1931, India, p.127) India is a collection of 10 speeches by Churchill as part of his campaign against the India Bill over which he broke with his party leadership. Though his cause was lost, these speeches are considered to contain some of the finest examples of Churchill's rhetorical brilliance. Clearly, Churchill did not adopt an early progressive attitude toward relinquishing control over the crown jewel of Britain's colonial empire. It is instructive to remember that Churchill spent formative time as a young 19th century cavalry officer fighting on the northwest Indian frontier, about which he would write his first published book. It is easy to remember that Churchill uncharitably called Gandhi "... a seditious Middle Temple lawyer... now posing as a fakir, striding half naked up the steps of the Viceregal palace to parley on equal terms with the representative of the King-Emperor." However, it is also instructive to remember that many of Churchill's dire warnings about Indian independence proved prophetic. Churchill had warned that too swift a British withdrawal from India would lead to bloody civil war and sectarian strife between Hindus and Muslims, Hindu domination, and destabilizing political balkanization of the subcontinent. All came to pass and much persists to this day. The first edition is most commonly found in orange paper wraps. However, there was also a hardcover binding, itself with two variants - one with the spine title reading horizontally and one with the spine title reading vertically as it does on the wraps issues. Per Churchill Bibliographer Ronald Cohen (pp. 372-375) the horizontal title binding preceded the vertical title variant. Hardcover copies were issued in a striking orange dust jacket. Note that the dust jackets feature a unique price on the front cover and spine and that the spine title always reads vertically, even if the binding beneath bears a horizontal spine title. Hardcover first editions are quite considerably rarer than their wraps counterparts and command a premium. Jacketed hardcovers are rarer still and on the infrequent occasions they are seen fetch prices commensurate with their great scarcity and desirability. A second and final printing of the first edition was issued almost immediately in the same month as the first printing. Like the first edition, these were issued in both hardcover and wraps versions. However, the wraps second printings are most often found in green covers unique to the second printing. Second printing copies in orange wraps like the first printing are an atypical variant. There were no further printings of India until 1990, which saw a quite belated U.S. first edition. This U.S. first edition was published by one-time Churchill book dealer and Churchill Centre President and longtime editor of the Churchill journal Finest Hour Richard M. Langworth. The common binding for the first U.S. edition is an orange cloth replica of the 1931 British first edition hardcover. There were 2,000 copies published thus. However, fire reportedly destroyed some of the stock. A limited edition issue of 100 copies was bound in orange leather, blocked gilt in the same design and lettering as the clothbound binding, with all edges gilt, black endpapers, and a gold satin page marker. These limited edition copies should also bear a hand-numbered limitation card laid in. The orange dust jacket unique to this first U.S. edition is illustrated with portraits of Churchill, Gandhi, Nehru, Britannia, an Indian Rajah, and George V. © 2014 Churchill Book Collector. All rights reserved. Guide to Churchill's Books The Story of the Malakand Field Force The River War (2 volumes) Savrola London to Ladysmith via Pretoria Ian Hamilton's March Mr. Brodrick's Army Lord Randolph Churchill (2 volumes) For Free Trade My African Journey Liberalism and the Social Problem The People's Rights The World Crisis (6 volumes) My Early Life / A Roving Commission Thoughts and Adventures / Amid These Storms Marlborough: His Life and times (4 volumes) Great Contemporaries Arms and the Covenant / While England Slept Step By Step 1936-1939 Into Battle The Unrelenting Struggle Onwards to Victory The Dawn of Liberation War Speeches 1940-1945 Secret Session Speeches The Second World War (6 volumes) The Sinews of Peace Painting as a Pastime Europe Unite In the Balance The War Speeches of the Rt. Hon. Winston S. Churchill (3 volumes) Stemming the Tide A History of the English-Speaking Peoples (4 volumes) The Unwritten Alliance Frontiers and Wars ...already in 1900, which is a long time ago, I could boast to have written as many books as Moses, and I have not stopped writing them since, except when momentarily interrupted by war... (Remarks of 4 July 1950)
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
Japan. Original http://www.japanesewanderer.com/must-see-places-in-nagoya/. Atsuta Shrine in or near Nagoya youtube journey economics forecast nightclubs. Sightsee 1639. Japan. Source http://www.gojapango.com/travel/nagoya_atsuta_shrine.htm. Atsuta Shrine in or near Nagoya people flight government buffet buildings. Vacation 1148. Japan. Source http://kikuko-nagoya.com/html/atsuta-jingu.html. Atsuta Shrine in or near Nagoya adventure seasons subtropical museum landmarks. Trip 1627. Japan. From http://victoriainjapanland.blogspot.com/2012/06/atsuta-shrine-main-shrine.html. Atsuta Shrine in or near Nagoya sunset resorts arts golf jobs. Spot 1546. Japan. From http://en.wikipedia.org/wiki/Atsuta_Shrine. Atsuta Shrine in or near Nagoya commute boat trip religion move jobs. Tour 1085. Japan. Source http://www.japanvisitor.com/japan-temples-shrines/atsuta-shrine. Atsuta Shrine in or near Nagoya drive money cultures market magazine. Tour 1124. Japan. Original http://www.gojapango.com/travel/nagoya_atsuta_shrine.htm. Atsuta Shrine in or near Nagoya video news harvest library area code. Tour 1093. Japan. Original http://www.happyjappy.com/nagoya/atsuta_shrine.html. Atsuta Shrine in or near Nagoya wedding vacation mountains bus routes buffet. Attraction 1031. Japan. From http://torwen.blogspot.com/2010_07_01_archive.html. Atsuta Shrine in or near Nagoya rent business trip nationality yoga academy. Holiday 1272.
{ "redpajama_set_name": "RedPajamaC4" }
The company has existed in its present organisational form since the beginning of 2003. The present organisation results from interdisciplinary experiences of the team that manages the company. Our joint knowledge on HR management, office work ergonomy, knowledge of technical features of basic materials shaping office space, combined with a flair for modern and functional forms, led to the launch of the METRO project. Creating objects used for arranging office spaces is our passion. Our ambition is to proportionally develop all aspects of activity in order to successively build a strong brand and our clients' trust. We know our clients by satisfying their need for friendly and comfortable furnishings. They appreciate our innovations. Our innovation is a decisive factor in the choice of our furniture. Our innowation makes us stand apart from our competitors. We want to expand our company by building a strong name in strategic markets. We are achieving this by improving our designs , production and distribution.
{ "redpajama_set_name": "RedPajamaC4" }
The Nepalese Shamanic Path: Practices for Negotiating the Spirit World (Paperback) By Evelyn C. Rysdyk, Bhola Nath Banstola (With), Sandra Ingerman (Foreword by) (SPIRITUALITY) An experiential guide to the shamanic spiritual practices of the Himalayas shared by a 27th-generation Nepalese shaman • Presents step-by-step, illustrated instructions for authentic Himalayan shamanic practices, including physical and spiritual healing, shamanic journeys, and ceremonies • Includes exercises to meet the ancestors in your shamanic lineage, techniques to use your voice as a shamanic tool, and practices for negotiating the spirit world safely • Details shamanic chants and rituals, how to create an altar, and the sacred objects of the shaman, along with exercises and techniques for using them properly There are few areas of our world where shamanic traditions have been preserved in their original context and form. Nepal is one of these rare and special places. In the shadow of the Himalayas Nepalese shamans, known as dhamis or jhankris, are still consulted for healing and divination, as well as for providing comfort and maintaining harmony. Following the devastating earthquake in Nepal in 2015, shamanic teacher Evelyn Rysdyk and 27th-generation dhami Bhola Nath Banstola decided it was time to safeguard Nepalese shamanic knowledge for future generations by recording the practices in a book. With this comprehensive, experiential guide to the ancient spiritual traditions of Nepal, Rysdyk and Banstola present step-by-step instructions for authentic Himalayan shamanic practices, including techniques for physical and spiritual healing, shamanic journeys, and advanced ceremonies, such as the Kalchakra Katne, a shamanic ritual for removing toxic energies from an individual. They include exercises to help you meet the ancestors in your shamanic lineage, techniques to use your voice as a shamanic tool, and practices for negotiating the spirit world safely. They detail shamanic chants and rituals, how to create an altar, and how to use the sacred objects of the dhami/jhankri, including the mala, the magic mirror, the drum, and the Khurpa, the shaman's magic dagger. Rysdyk and Banstola also examine the importance of Nepalese cosmology in shamanic ritual and spiritual deities such as Hanuman, Garuda, and the Nagas. Illustrated with photos and Rysdyk's artwork, the book also explores the history of Nepal, its culture and myths, and the different ways Nepalese shamans serve their communities. Written specifically to share the traditional Himalayan shamanic method with the Western world, this guide not only preserves these ancient teachings but also reveals how they are still relevant in the modern world. Evelyn C. Rysdyk is an internationally recognized shamanic healer, teacher, speaker, and author of Spirit Walking: A Course in Shamanic Power, Modern Shamanic Living, and A Spirit Walker's Guide to Shamanic Tools. She is a founding member of the Society for Shamanic Practitioners and a presenter for international events such as the Shamanism Global Summit and the Year of Ceremony. She enjoys living and working on the coast of Maine. Bhola Nath Banstola is a 27th-generation Nepalese shaman, or jhankri. With his wife, he teaches traditional Himalayan shamanic practices in Europe and North America and leads groups on shamanic tours of Nepal. He divides his time between Italy and Nepal. Sandra Ingerman, M.A., is a renowned shamanic teacher who gives workshops internationally on shamanic journeying, healing, and soul retrieval. An award-winning author of 10 books, including Awakening to the Spirit World and Soul Retrieval, she lives in Santa Fe, New Mexico. "The collaboration of Rysdyk and Banstola has created a compelling read--one that my inner anthropologist recognizes as an ethnography. These two visionaries, Western and Traditional, have given us a look into a non- Western cultural tradition that few of us know about. My inner understanding of myself and my world has been enhanced in response." — Hank Wesselman Ph.D., anthropologist, author of the Spiritwalker trilogy "This book is an accessible chronicle of esoteric cosmology and ritual that preserves the wisdom ways of an ancient people. The abundant and detailed practices and ceremonies that are presented in this book, which might otherwise be lost, make the spirits come alive for the modern practitioner. This is a generous and enduring work." — Llyn Cedar Roberts, M.A., coauthor of Speaking with Nature "If you've been intimidated by the intricate and complex cosmology associated with Nepalese shamanism, this is the book that will walk you through it intelligently, gracefully, and comprehensively. This is an important book to add to the growing effort to preserve indigenous shamanism." — Tom Cowan, author of Fire in the Head "This inspirational book reveals the heart of the Nepalese shamanic tradition, showing the essential art of fastening heaven to Earth and releasing all beings from the bondage of the eight fetters by restoring health and harmony to sick people and disenchanted places with loving grace." — Caitlín Matthews, author of Singing the Soul Back Home "Brilliant shamanic healer and teacher Evelyn Rysdyk has joined forces with Nepalese wisdomkeeper Bhola Banstola to bring us this amazing offering of the ancient practices of Himalayan shamanism. These ancient practices offer a transformation for you, your community, and the world." — Michael Stone, radio host of Conversations and shamanic practitioner "Rysdyk and Banstola offer us a profound merging of ancient Nepalese wisdom and modern understanding, through which we may learn to ride the razor's edge between chaos and order that is the dhami/jhankri's path to shamanic empowerment." — Hillary S. Webb, Ph.D., author of Yanantin and Masintin in the Andean World "An astoundingly practical workbook and doorway into the ancient Nepalese shamanic tradition. A book we have waited for for a long time. Rysdyk and Banstola have given us a great gift!" — Nicholas Breeze Wood, editor of Sacred Hoop magazine "A big bow of gratitude for this important and captivating book that combines fascinating stories of transcendent initiations into the author's twenty-seventh-generation Nepalese lineage and step-by-step instructions of ceremonies applicable to all shamanic lineages. This book touched my heart!" — Alida Birch, author of The Co-Creation Handbook "How lucky to have such knowledgeable and generous guides as Evelyn Rysdyk and Bhola Nath Banstola to lead us on this fascinating journey to explore the ancient spiritual wisdom and ritual practices of Nepalese shamanism." — Mama Donna Henes, urban shaman and author of Bless This House "This is an inspiring and vital gathering of unique wisdom nuggets and useful practices derived from a mysterious ancient society. A must-read." — Itzhak Beery, author of The Gift of Shamanism and publisher of shamanportal.org "Like discovering an ancient manual and toolbox for reconnecting with your primordial spiritual source, Banstola's childhood encounters with Himalayan spirits of creation, destruction, and death read like a thriller. These authors have made a significant contribution to the literature on shamanism." — Robinette Kennedy, Ph.D., clinical anthropologist and shamanistic practitioner "This book is an outstanding contribution in the field of psychological anthropology" — Prem K. Khatry, Ph.D., retired professor of culture at Tribhuvan University, Kathmandu "This book, with its wise words and beautiful and evocative photographs and illustrations, is based upon the collective wisdom of many lifetimes and will provide the reader with guidance for a lifetime of exploration and learning. Recommended." — Martin Pallot, Indie Shaman magazine Publisher: Destiny Books Body, Mind & Spirit / Shamanism Social Science / Indigenous Studies Self-help / Spiritual
{ "redpajama_set_name": "RedPajamaCommonCrawl" }