text
stringlengths 18
981k
| meta
dict |
---|---|
15 soldiers sentenced for 'false positives' murders
by Adriaan Alsema December 22, 2011
Fifteen Colombian army soldiers were sentenced to 25 and 26 years in prison Wednesday for the 2006 murder of five men who were later presented as guerrillas killed in combat.
A judge in the central Colombian city of Ibague convicted the members of the elite anti-kidnapping squad for the extrajudicial execution of five members of a soccer team.
Following the massacre, the victims were reported as rebels killed in combat, a phenomenon which has become known as "false positives" and for which hundreds of members of the security forces are investigated.
The commander of the squad was given a 26-year sentence while his subordinates were given 25 years.
"Today we can't say we are happy because it has been five years of struggle, but we are more calm because justice is being done," a relative of one of the victims who asked not to be named told El Tiempo newspaper.
According to the latest report of Colombia's Prosecutor General's Office, members of the armed forces are suspect in 8,295 cases of human rights violations, including 1,598 "false positive" cases.
armed conflictfalse positivesmilitaryTolimavictims
'Colombia's former army chief continued to promote murder after his resignation'
Human rights advocates want Colombia's war crimes tribunal to try businessmen and politicians | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
WASHINGTON, June 28 — President Bush's effort to overhaul the nation's immigration policy, a cornerstone of his domestic agenda, collapsed in the Senate today, with little hope that it can be revived before Mr. Bush leaves office in January 2009.
The bill called for the biggest changes to immigration law in more than 20 years, offering legal status to millions of illegal immigrants while trying to secure the nation's borders. But the Senate, forming blocs that defied party affiliation, could never unite on the legislation's key provisions. Rejecting the president's last-minute pleas, it voted 53 to 46 to turn back a motion to end debate and move toward final passage. Supporters fell 14 votes short of the 60 needed to close debate.
Mr. Bush placed telephone calls to lawmakers throughout the morning, but members of his party abandoned him in droves, with only 12 of the 49 Senate Republicans sticking by him on the key procedural vote that determined the bill's fate. Nearly one-third of Senate Democrats voted, in effect, to block action on the bill.
The bill called for the biggest changes in immigration law in more than 20 years. The vote followed an outpouring of criticism from conservatives and others who decried it as a form of amnesty for lawbreakers. The outcome was a bitter disappointment for Mr. Bush and other supporters of a comprehensive approach, including Hispanic and church groups, and employers who had been seeking greater access to foreign workers.
Both supporters and opponents said the measure was dead for the remainder of the Bush administration, although it is conceivable that individual pieces might be revived.
The vote reflected the degree to which Congress and the nation are polarized over the issue of immigration. The emotional end to what had been an emotional debate was evident today, with a few senior staff members who had invested months in writing the bill near tears at the result.
"The bill now dies," said Senator Dianne Feinstein, Democrat of California, who helped write the measure.
The outcome also underscored the challenge that Mr. Bush faces in exerting authority and enacting an agenda at a time when members of his own party increasingly break with him and the Democrats no longer fear him. Having already given up on other ambitious second-term plans like overhauling Social Security, the White House has little prospect of winning any big new legislative achievements in the final 19 months of Mr. Bush's tenure.
But the collapse also highlighted the difficulties that the new Democratic leadership in Congress has had in showing that it can address the big problems facing the nation. In this case, Democratic leaders asserted that the failure of the immigration bill was a reflection on Mr. Bush's issue and not on their party.
In voting to end debate, the 12 Republicans were joined by 33 Democrats and 1 independent. Voting against the motion to end debate were 15 Democrats, 1 independent and 37 Republicans, including the minority leader, Senator Mitch McConnell of Kentucky.
Among the Democrats voting no were several up for re-election next year, including Senators Max Baucus of Montana, Tom Harkin of Iowa and John D. Rockefeller IV of West Virginia.
In the end, many of the groups who had supported pieces of the bill urged the Senate to pass it in the hope that it could be "improved" in the House.
Supporters of the bill agreed with opponents on one point: Many Americans believe that the government lacks the ability to carry out the huge responsibilities it would have had under the bill.
"People look out and they see the failures of government, whether it's Hurricane Katrina or the inability to get enough passports out for people, and they say, 'How is the government going to accomplish all of this?' " Ms. Feinstein said.
Opponents of the bill were elated.
Senator Jeff Sessions, Republican of Alabama, a leading opponent of the bill, said that talk radio was "a big factor" in derailing the immigration bill.
Supporters of the bill wanted to pass it quickly, "before Rush Limbaugh could tell the American people what was in it," Mr. Sessions said. | {
"redpajama_set_name": "RedPajamaC4"
} |
Thomas Domian, född den 5 juli 1964 i Gelsenkirchen i Tyskland, är en tysk roddare.
Han tog OS-guld i åtta med styrman i samband med de olympiska roddtävlingarna 1988 i Seoul.
Referenser
Källor
Externa länkar
Sports-reference.com
Tyska roddare
Tyska olympiska guldmedaljörer
Olympiska guldmedaljörer 1988
Tävlande vid olympiska sommarspelen 1988 från Västtyskland
Tävlande i rodd vid olympiska sommarspelen 1988
Personer från Gelsenkirchen
Födda 1964
Levande personer
Män | {
"redpajama_set_name": "RedPajamaWikipedia"
} |
Dubai is easily one of the most well-known and visited of the United Arab Emirates. This independent city-state is the picture of modern architecture and class. It's often hard to believe that it was once nothing more than a quaint fishing and trading town that seemed to develop overnight! Today, it offers an amazing nightlife, excellent shopping, fine dining and everything a visitor could ever dream of. It is these attributes that make it an increasingly popular Middle East destination for cruise lines.
Whether departing or arriving, ships will dock at the Dubai Cruise Terminal. Just like the rest of this thriving city, the cruise terminal is modern and more than adequately equipped to welcome visitors. Facilities in the port include currency exchanges, free internet access on the business centre's terminals and food outlets. You can also enjoy some duty free shopping, visit the post office to send a postcard to a loved one back home and take a free shuttle bus to Mercato Mall and the busy city centre.
Whether you are departing or arriving, Dubai is a great place to spend a few days before or after your cruise. The public transport systems and infrastructure make it really easy and even fun to explore this vibrant city. It is no secret that Dubai wants to be the fastest, tallest and the biggest in everything they do. It is this ambition that has led to the design and construction of several jaw dropping structures. Even with all this modern style, it is important for visitors to take note of their attire. A modest dress code is advised when in public.
In Downtown Dubai you will find the Burj Khalifa skyscraper which, at a height of 829.8 metres, is the tallest building in the world. In this same area you will also find the Dubai mall which is known for being the largest in the world. This is a shopping haven with over 1,200 shops that attract a quarter of a million shoppers every week! Another popular sight in the central part of the city is the Dubai Fountain. This choreographed water features is even larger than the Bellagio dancing fountain in Las Vegas!
Jumeirah is a wonderfully multicultural area and, if you are looking for the perfect beach, this is where you will find it!
Satwa is known for having a strong Indian and Filipino presence and it is also famous for its gold market, or Gold Souk, where many locals and visitors go to shop for this precious metal. Another popular commodity in this district are textiles.
For those who are fascinated by history and would like to learn more about life in Dubai over the years, you should most definitely make your way to the Bur Dubai district. Here you will find several old buildings, mosques and museums.
Cruises that depart from Dubai may come in the form of a trip to other Emirates, or they could include more destinations and a longer cruise from the Middle East to Asia or to the Mediterranean via the Suez Canal.
MSC Cruises offer several short itineraries from Dubai to various other Emirates. These are idea for cruise enthusiasts to get to know the Middle East a bit better. Cunard, Princess and other larger cruise lines often include Dubai as a destination on their World Cruises. The luxury cruise line, Regent Seven Seas, offers cruises from Dubai that include several stops in various Asian ports.
No matter what type of cruise or itinerary you seek, Go 4 Cruise Holidays makes it easy to search and find a wide range of available cruises from Dubai. | {
"redpajama_set_name": "RedPajamaC4"
} |
Exercise can boost the effectiveness of your Covid-19 vaccine, new study finds: here's how to get the most out of it
Being the most protected against serious consequences after a Covid-19 infection is largely attributed to vaccination. But, shooting efficiency can be improved by physical activity, according to a new study.
High levels of physical activity appeared to be associated with greater efficacy of the primary series of the Covid-19 vaccination, according to new research published in the British Journal of Sports Medicine.
"The higher the exercise dose, the greater the protective effect, obviously to some extent," said Jon Patricios, professor of sports and exercise medicine at Wits University in Johannesburg and co- author of the study, to CNBC Make It.
So how often and how hard should you exercise to get the most out of your Covid-19 vaccinations? Here's what Patricios and his co-authors discovered.
2.5 hours of exercise per week may increase protection against severe Covid consequences in vaccinated people
Researchers found that vaccinated people best protected against serious consequences, such as hospitalization, after Covid-19 infection followed these exercise guidelines:
Frequency: They did at least 150 minutes, or two and a half hours, of physical activity each week.
Intensity: Their physical activity was of moderate intensity, which means that their heart rate was between 70% and 79% of their maximum heart rate during exercise.
Participants in this group were 2.8 times less likely to develop serious consequences of Covid-19 than people who rarely exercise. Or, in simpler terms, their vaccines were 25% more effective at protecting them from these outcomes than sedentary people.
In a video embedded in the study, visual depictions of weightlifting and running are highlighted as some of the exercises the group engaged in.
"It's likely that at a higher level of physical activity you get a more positive stimulation of that immune response," says Dr. Elizabeth Joy, senior medical director of wellness and nutrition at Intermountain Healthcare, who did not participate in the study. .
"This, in turn, leads to the observed decrease in disease burden."
Yet even vaccinated people who exercised between 60 minutes and 149 minutes were 1.4 times less likely to have severe cases of Covid infection.
This is how the study was conducted
The researchers analyzed data collected from South Africa's largest health insurer on nearly 200,000 vaccinated adults in the country, including both men and women. At the time the study was conducted, only the Johnson & Johnson vaccine was available.
The data included Covid-19 PCR test results from February to October 2021. And minutes of physical activity, step count and heart rate data were tracked for each person using a wearable device.
Exercise may also reduce risk of severe Covid outcomes in unvaccinated people
"We had another study that showed that in people who got Covid — and they were unvaccinated people — those who did the recommended 150 minutes of exercise per week had better results," says Patricios.
"They were admitted to hospitals less, fewer of them were in intensive care and on ventilators and fewer of them died."
Similar to his research, a study was conducted on more than 48,000 participants with Covid, before vaccines became available, to determine whether exercise was associated with a lower risk of serious consequences from the disease.
The researchers found that those who walked or exercised regularly, before infection, were about half as likely to be hospitalized due to Covid.
"It just adds to that evidence base that people who are more physically active are healthier," says Joy.
Although it has been widely studied that exercise can reduce the risk of non-communicable diseases like dementia and cancer, "physical activity is also an effective strategy to prevent communicable diseases like Covid-19", notes Joy.
When it comes to physical activity for better health outcomes, she says, "none is bad, some is good. [and] more is better."
Want to earn more and work less? Register for free CNBC Make It: Your Money Virtual Event on Dec. 13 at 12 p.m. ET to learn from the money masters how you can increase your earning power.
Register now: Be smarter about your money and your career with our weekly newsletter
#Exercise #boost #effectiveness #Covid19 #vaccine #study #finds #heres | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Your weekly grocery list probably includes cheese. It's great on sandwiches, as a snack, and melted over veggies to make the green stuff more appealing to kids.
Whatever your preference – gouda, provolone, cheddar – keep eating! America has a huge surplus of cheese.
How much cheese are swimming in? The Agricultural Department last month reported that we have 1.39 billion pounds of extra cheese. That's a lot of grilled cheeses.
As a result of the milk surplus, cheese prices have declined drastically, probably because milk is most easily stored as cheese. Advances in science and genetics have translated into cows that produce more milk, and farms are keeping more cows. When farmers are unable to sell off all the milk — which Americans are moving away from — the processors convert the excess milk into butter, milk powder and cheese.
Industry experts acknowledge that the need for cheese declines around this time each year. During the spring season, cows are their most productive, as they feed better and the days are longer. At the same time, school is out, restaurants begin shying away from rich, cheesy dishes during the hottest months, and people at home are eating less cheese than they do around the school year and the holiday season.
Still, the cheese surpluses the U.S. is experiencing during the summer months keep getting bigger.
What's more is the abundance of cheese in storage may also be part of the problem. Cheese prices have fallen in recent weeks, which some believe are both a response to the surplus and to growing trade concerns. Some people are worried that American cheese stockpiles will continue to swell if trade tensions with China and Mexico cut into dairy exports.
That fall in the profit margins on cheese is troubling on another level – the price of cheese is a key player in the equation the USDA uses when determining the price dairy farmers will receive for milk. Currently, the price is $15.36 per 100 pounds, which is about a dollar below 2017's average and far below the amount many farmers claim they need simply to break even.
So far, dairy groups haven't approached the USDA for quantitative cheesing (there's that term again!), like they did back in 2016 when the agency bought more than 90 million pounds of excess cheese.
Michael Dykes, president of the International Dairy Foods Association, told the Washington Post that although stockpiles are high, he believes Americans will eat their way through them. That's because stock-to-use ratios have remained constant even at higher levels like the ones we have in stored cheese right now.
And who doesn't love good homemade macaroni and cheese? Or a tray of lasagna? Or fresh, gooey pizza? No matter how you incorporate it into your dinners, it's a fact that we Americans enjoy our cheese. If I loaded up on cheese-filled dishes this week despite my summer diet, could I say I'm just patriotic? Well, that's what I'll tell myself. | {
"redpajama_set_name": "RedPajamaC4"
} |
Julien Epaillard & Cheyenne d'Auge Reign Again in €51,800 CHG Grand Prix CSI 3*
Oliva Nova, Spain – October 14, 2021 – With three riders from the top fifteen on the Longines Ranking at start, Sunday's CSI 3* 1.50m Grand Prix, presented by CHG concluded the third and last week of 2021 Autumn MET II with spectacular sport. After a jump-off between 13 horse-and-rider combinations, it was the French master of faster Julien Epaillard (FRA) on the 9-year-old mare Cheyenne d'Auge who took home the win.
Thirteen pairs out of the 54 participants cleared the first-round track set by Christian Wiegand (GER), but only five of them could keep the fences intact in the jump-off and produce a double clear result. Rebecca Conway (USA) on Con Coleur (Contendro I x Couleur Rubin) delivered the first double clear of the class with a time of 47.35 in the jump-off, but was soon overtaken by Julien Epaillard (FRA) on Cheyenne d'Auge (Guarana Champeix x Diamant de Semilly), who stopped the clock on 44.39 – a time that no one after him could match. Cameron Hanley (IRL) on ESI Toulouse (SIEC Livello x Quasimodo van de Molendreef) got close and took the runner-up position with a time of 45.21, while Fernando Martinez Sommer (MEX) on Cor Bakker (Colandro x Quattro) placed third and Conway fourth. Harold Megahey (IRL) on Kingston (Ustinov x Insider) took the fifth spot with a double clear in 49.39 seconds.
Julien Epaillard (FRA) & Cheyenne d'Auge
Epaillard thought the Grand Prix was difficult enough, and to win with a horse that is from his own breeding program made it special. "Cheyenne is home bred, I started to ride her this year, before this, my rider produced her," Epaillard explained. "She has a lot of blood, and she always jumps good, but she has been very difficult to ride. Now, the rideability is a little bit better, and she has already won many 1.45m classes. I think she is a very competitive mare, maybe not for the very highest classes, but it is nice to have a naturally fast horse like her. I am happy to breed horses like this! It is always special to win with a home bred horse, even though she is not the first Grand Prix winner we have."
"I like to come to Oliva, it is a nice place for the horses", Epaillard said. "I come back in January with a group of good 8-year-olds. It is great to jump here, it is easy to make a good program for the horses. I am always happy to return."
For Ireland's Cameron Hanley (IRL) the runner-up position marked a great comeback to the show ring as the Irish rider was forced to stop riding for six months after an injury he sustained at the beginning of the year. "Now we are back, and that is what I came to this tour for; to build up the horse again," Hanley said. "That's why I am so happy about the result today, it all finished just as I wanted."
"I thought the course was big and difficult, the time allowed was fair, so there were enough clear rounds," Hanley said about today's course. "I think the course building has been excellent all the time during the tour; a big compliment to the course builders."
"Julien is just incredible," Hanley said about today's winner. "I just went as fast as I could go and tried to execute my plan."
Hanley's ride Toulouse is an Irish bred horse by Livello, a stallion that Hanley rode to a 4th place finish at the 2009 European Championships. "I have owned Toulouse since he was four. I love this horse; we have a very good connection. I know him really well and he knows me. It makes it all the sweeter to get a good result with a horse you've spend so long time with."
Speaking about the venue at the Mediterranean Equestrian Tour, Hanley said: "It is just stunning. I have gone more into the direction of training and teaching and my student Clara Hallundbaek was also clear in the Grand Prix today. I get just as much of a buzz watching her do well as I do myself. Here at the MET, the showground is designed so well. To be able to get from ring to ring easily to help students, it is really practical. It is just a great place to come to, I always look forward to returning here."
The tour now takes a week off before returning with its third and last part, the Autumn MET III 2021 which kicks off on November 23rd.
Julien Epaillard (FRA) & Cheyenne d'Auge during the awards ceremony
Final Results – €51,800 CHG Grand Prix CSI 3*
1) Julien Epaillard (FRA) & Cheyenne d'Auge – 0 / 0 – 44.39
2) Cameron Hanley (IRL) & ESI Toulouse – 0 / 0 – 45.21
3) Fernando Martinez Sommer (MEX) & Cor Bakker – 0 / 0 – 47.15
Text: Jumper News, no reproduction without permission
Photos: © MET / Hervé Bonnaud / www.1clicphoto.com
Tagged as: Chevaux, Cheyenne d'Auge, CSI 3*, Equestrian, Fédération Française d'Equitation, FFE, Horses, Julien Epaillard, Jumper News, Jumper News France, Mediterranean Equestrian Tour - Autumn MET, Mediterranean Equestrian Tour - Autumn Tour, MET, Results, Selle Français, SF, Showjumping | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Watchmen Pilots Guide Premieres Renewal Scorecard TV's Top 5 Series Regular Grey's TWD
November 05, 2015 9:49am PT by Josh Wigler
George R.R. Martin Promises His 'Game of Thrones' Ending Will Offer Up "Some Hope"
AP Images/Invision
For every Red Wedding and Ned Stark beheading, there's still some measure of hope for the heroes of Westeros — on some scale, at least.
George R.R. Martin, author of the A Song of Ice and Fire books that provide the basis for HBO's Game of Thrones, spoke out about his epic fantasy series during a discussion at his alma mater Northwestern University's Medill School of Journalism, and what his readers should expect when the story concludes.
"I think you need to have some hope," he said Wednesday of how he envisions the end of the series. "We all yearn for happy endings in a sense. Myself, I'm attracted to the bittersweet ending."
Martin has long maintained his plan to match the ending of Ice and Fire with the tone of J.R.R. Tolkien's Return of the King, which saw Frodo Baggins and his fellow Hobbits succeed in their quest to save the world, only to return home and discover it ransacked by war. Given the current political landscape throughout the Seven Kingdoms of Westeros — not to mention the threat of White Walkers, zombies and ice spiders north of the great Wall separating the realms of men from unknown forces of lore — it's easy to see how Martin's story could land in that same space.
"I think Tolkien did this brilliantly," he said.
Martin also addressed the speed with which he's writing his novels (there are still two unpublished books in the series) versus the speed with which the team behind Game of Thrones has produced seasons of the show.
"I've been hearing them come up behind me for years, and the question is: How can I make myself write faster? I think, by now, the answer is I can't. I write at the pace I write, and what the show is doing is not going to change what the books are," he said. "I started writing about these characters and this world in 1991, and we didn't have the first meetings to create the show until 2008, so I got like a 17-year head start!"
The most recent book in the Ice and Fire series, A Dance With Dragons, was released in 2011. The show, currently in production on its sixth season, has depleted nearly all of the major story lines from the published material — though there are rumors that Martin's next book, The Winds of Winter, could arrive before the new season begins.
Josh Wigler
[email protected] @thr
TV Scorecards
TV Pilots 2020: The Complete Guide
TV Premiere Dates 2020: The Complete Guide | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Sen. Tracy appointed to Senate Leadership Post
Senator Jil Tracy has been appointed to a Senate Republican leadership post as the Illinois General Assembly gears up for its 102nd biennial legislative session.
The 47th District Senator has been named Senate Republican Whip by Senate Republican Leader Designate Dan McConchie (R-Hawthorn Woods). In that role, she will work closely with the rest of the Leadership team on guiding legislation and setting policy.
"The interests and concerns of 47th District residents will remain my top priorities, but as Senate Whip, I will be able to bring our region's commonsense and real-life insight to the discussion about issues like creating jobs and easing the tax burden for working families and businesses," Senator Tracy said. "Such issues affect us all as Illinois citizens."
Senator Tracy has served in the Senate since November 2016. She had previously served as a member of the House of Representatives from 2006 to 2014.
"Senator Tracy is widely respected not just in our caucus, but the General Assembly as whole," said Leader Designate McConchie. "She knows exactly who she is and what she is here to do. That confidence and understanding of what Illinois needs to become more successful is invaluable in our leadership team. We will rely heavily on her experience and insight as our Republican Senate Caucus Whip."
The 102nd General Assembly is scheduled to begin January 13, following the inauguration of its members.
For the current 101st General Assembly, Senator Tracy is the Republican Spokesperson for the Senate Telecommunications and Information Technology Committee, and for the Government Accountability/Ethics Committee. She also serves as a member of the Agriculture, Executive Appointments, Judiciary, Labor, and State Government committees.
Senator Tracy's district offices are located at 3701 East Lake Centre Dr., Suite 3, Quincy, IL 62305 (217-223-0833) and 331 N. Lafayette St., Macomb, IL 61455 (217-214-9705).
PrevPreviousHappy New Year!
NextSenate Week in Review: January 4-8, 2021Next | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
5.5 mil crepe paper tape with rubber adhesive. A utility purpose paper tape for holding, bundling, sealing, non-critical masking and a vast number of other jobs where pressure sensitive tape is needed. Should not be subjected to outdoor or UV exposure.
Size: 3" x 60 yds. | {
"redpajama_set_name": "RedPajamaC4"
} |
<>There are times when all we need is to freshen up. Our skin may be blotchy, discoloured or dull from too much sun, too little care, or just a simple case of ageing.
Photorejuvenation using Intense Pulsed Light (IPL) In photorejuvenation (also known as photo facial or skin rejuvenation), medical-grade IPL is used to gently repair collagen in the dermis and stimulate new collagen growth. This leads to improvements in skin texture and smaller pore size. The pulses of light also reach into the epidermis to constrict blood vessels. This will reduces facial redness, fine vessels, freckles, pigmentation, and sun damage.Halley's Intense Light Rejuvenation can be used on areas such as the thighs, legs, and arms.
Body peels Chemical peels are effective for gentle sloughing off dead skin and revealing new skin beneath. At Halley, we use a glycolic acid peel, which is suitable for all skin types. It can be used on our body to improve the texture and surface appearance of the skin, improve uneven skin tones by lightening skin blemishes and scars, and reduce the appearance of fine lines and wrinkles. | {
"redpajama_set_name": "RedPajamaC4"
} |
Thank you for becoming part of our virtual-real space and for your support.
2008 was a very important year: it marked the beginning of the German and English-language edition of Public Republic. We hope they are a means to make the world a more interesting and smiling place.
Thanks to all of us, our magazine is growing and thriving to be more colorful, dynamic, varied and exciting.
We wish you to be healthy, happy, successful and complete during the New Year of 2009.
Happiness and love to all! | {
"redpajama_set_name": "RedPajamaC4"
} |
NewsHistory
news, history,
The published history of the Bolivia district has received a dust-off and update in a new tome Bolivia – A Century and a Half officially launched at Bolivia Hall on Saturday, August 25. The community effort spearheaded by Fay and Debbie McCowen and Sandra Wilson reviewed the 30-year-old earlier publication, editing, adding new content and adopting a new format to wrap up the colourful history of the district that boasts strong family ties. "It looks good," Mrs Wilson said. "We're very pleased with it." READ ALSO: The book follows the history from 1840 when Edward Hurry acquired the first pastoral licence for Bolivia Station, through all the owners until today. It includes the railway and how it influenced the area, schools, post office, telephone exchange, hotels, properties and owners, war veterans and the lone pine, weddings, family gatherings, the annual Christmas tree, Bolivia cemetery, Bolivia Hill and the present day changes. Bolivia's history runs the gamut of drought, floods and fire, all contained within the book's 102 lively pages peppered with historic photographs. Stories were sourced from Bolivia residents and the Bolivia Hall history collection and printed by Tenterfield Printing. Bolivia Progress Association vice president Ken Hutchison welcomed more than 70 people gathered at hall for the launch before Miss McCowen gave a condensed book review. Mayor Peter Petty spoke on behalf of council and Paul Schiffmann then described how the original book was compiled. Tony Bates, a descendant of the first white child born on Bolivia Station, spoke of his family and the local connections before launching the book, with afternoon tea following. Mrs Wilson said the publication is very much a labour of love on behalf of those involved, and is the culmination of many months of hard work. Of the 300 copies printed in this edition, many have gone to Bolivia family and friends. Others wishing to get their hands on a copy can contact anyone in the Bolivia Progress Association. The cover price is $20.
https://nnimgt-a.akamaihd.net/transform/v1/crop/frm/QfJyEpp8pWf35w8rXkJF78/bd1330df-07e9-4ca6-951f-bd4baaec59e1.JPG/r163_62_1181_637_w1200_h678_fmax.jpg
'Bolivia – A Century and a Half' launched
(From left) Paul Schiffmann, Fay McCowen, Tony Bates, Debbie McCowen, Sandra Wilson and Ken Hutchison at the book launch in Bolivia Hall.
The published history of the Bolivia district has received a dust-off and update in a new tome Bolivia – A Century and a Half officially launched at Bolivia Hall on Saturday, August 25.
The community effort spearheaded by Fay and Debbie McCowen and Sandra Wilson reviewed the 30-year-old earlier publication, editing, adding new content and adopting a new format to wrap up the colourful history of the district that boasts strong family ties.
"It looks good," Mrs Wilson said.
"We're very pleased with it."
Council project to boost district's heritage merits
$100k to repurpose historic church as a community hub
The book follows the history from 1840 when Edward Hurry acquired the first pastoral licence for Bolivia Station, through all the owners until today. It includes the railway and how it influenced the area, schools, post office, telephone exchange, hotels, properties and owners, war veterans and the lone pine, weddings, family gatherings, the annual Christmas tree, Bolivia cemetery, Bolivia Hill and the present day changes.
Bolivia's history runs the gamut of drought, floods and fire, all contained within the book's 102 lively pages peppered with historic photographs. Stories were sourced from Bolivia residents and the Bolivia Hall history collection and printed by Tenterfield Printing.
Bolivia Progress Association vice president Ken Hutchison welcomed more than 70 people gathered at hall for the launch before Miss McCowen gave a condensed book review.
Mayor Peter Petty spoke on behalf of council and Paul Schiffmann then described how the original book was compiled. Tony Bates, a descendant of the first white child born on Bolivia Station, spoke of his family and the local connections before launching the book, with afternoon tea following.
Mrs Wilson said the publication is very much a labour of love on behalf of those involved, and is the culmination of many months of hard work. Of the 300 copies printed in this edition, many have gone to Bolivia family and friends.
Others wishing to get their hands on a copy can contact anyone in the Bolivia Progress Association. The cover price is $20.
Discuss "A century and a half of Bolivia history conserved in new book" | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
package speedy.model.algebra;
import speedy.model.algebra.operators.AlgebraTreeToString;
import java.util.ArrayList;
import java.util.List;
abstract class AbstractOperator implements IAlgebraOperator {
protected IAlgebraOperator father;
protected List<IAlgebraOperator> children = new ArrayList<IAlgebraOperator>();
public IAlgebraOperator getFather() {
return father;
}
public void setFather(IAlgebraOperator father) {
this.father = father;
}
public void addChild(IAlgebraOperator child) {
child.setFather(this);
this.children.add(child);
}
public List<IAlgebraOperator> getChildren() {
return children;
}
public IAlgebraOperator clone() {
try {
AbstractOperator clone = (AbstractOperator) super.clone();
clone.children = new ArrayList<IAlgebraOperator>();
for (IAlgebraOperator child : children) {
IAlgebraOperator childClone = child.clone();
childClone.setFather(clone);
clone.children.add(childClone);
}
return clone;
} catch (CloneNotSupportedException ex) {
return null;
}
}
@Override
public String toString() {
return this.toString("");
}
public String toString(String indent) {
return new AlgebraTreeToString().treeToString(this, indent);
}
}
| {
"redpajama_set_name": "RedPajamaGithub"
} |
Location: 31 E Main Street, Westminster, MD.
On Thursday, August 16th, Coffey Music will be hosting a special workshop and PRS Event with Perophyer guitarist, Mark Holcomb.
There will be plenty of new Core, S2, and SE models and PRS amplifies to see and play. Mark will be demonstrating the SE Holcomb and the new SE Acoustics. PRS Brand Ambassador, Clay Lord will be on hand to answer questions and chat about the craftsmanship and playability of PRS electrics, acoustics, basses and amplifiers. Of course, you will have the Coffey Music team to help with any of your musical needs as well. It is going to be an awesome evening of guitars and good times.
This fun, informative event is FREE and geared toward guitar fans, Periphery fans and anyone into the artistry, craftsmanship, and playability behind these beautiful guitars. | {
"redpajama_set_name": "RedPajamaC4"
} |
Lately, I've been focusing on the theme of 'Motivation' and personal growth. Motivation is so important – it's what keeps me going and getting things done. There's a lot of successful people who have the drive necessary to continue and find their journey of self-growth. However, even the most achievement-oriented people come to a point when their motivation levels can become drained – so, how can we keep that spark of encouragement going to give us that push? One way, is when we encourage each other.
No matter the time or place, everybody needs some inspiration in their everyday lives (I certainly do). The 'Cans of Motivation' campaign as part of my #Cindy365Notes project is to help us keep moving toward success, positivity at work and happiness; consisting of 28 different Cans of Motivation each with their own motivational purpose and I think everyone could benefit with a daily dosage of motivation to kick start their day!
How to download: click here to download PDF, print off and use as you please! Printing tip: Always make sure, in the printer 'setup' that you set your printer quality settings to "High". Enjoy! | {
"redpajama_set_name": "RedPajamaC4"
} |
THE GRAND SCHEME OF THINGS by Beans on Toast
by Carter Moon · October 13, 2015
Favorite Tracks: "Folk Singer", "The War on War", "NYE"
Jay McAllister is the exact kind of folk figure people love to canonize and worship. Through his moniker Beans on Toast, the UK artist has released an absurd amount of music, starting with his 2009 double LP STANDING ON A CHAIR. He is so earnest and straightforward in his delivery that it's hard to not like him; most of his songs consist of his take on love, drugs, and politics, delivered over acoustic guitar and varying accompanying instruments. His politics are stripped of theory and based on gut-feeling and simple hippie peace-and-love ideology; he does a tidy job of tying political issues to his personal life. What makes him stand out as a folk artist is how much he fixates on brief, passionate love affairs with scores of women, dancing around possible accusations of misogyny while managing to convince his audience that his cheeky bravado is really a foil for a deep love of women and the possibilities of human connection through sex. He's a folk singer who always keeps things light, even when he stumbles into darker subject matter. His albums feel as much as if he's hosting the greatest, most life-affirming party, as he is dealing with the immediate issues of his day.
With his latest release, THE GRAND SCHEME OF THINGS, Beans on Toast strays from the formula he's established for himself just enough to keep things interesting, while not isolating anyone who's traced his career over the last six or seven years. The problem with STANDING ON A CHAIR was that he touched on the same subjects so many times over the course of fifty tracks that it eventually felt as if he had run out of anything to say. Thankfully, on subsequent releases, he's whittled his tracklists down considerably to twelve or fifteen tracks per album, which makes it feel as if he's selected the best from his catalog rather than just dumping everything on the listener all at once. Part of the charm of Beans on Toast is his need to let all of his thoughts spill out of him, but a sense of self-editorializing allows each track on THE GRAND SCHEME OF THINGS to stand out instead of getting lost in the noise.
Musically, this album utilizes other musicians and different styles in order to allow the tracks to become more distinguishable as a result. "Fuck You Nashville" is a country track about being disappointed in the capital of country music, "NOLA Honeymoon" is a big band swing song that recounts the story of a romantic night spent in New Orleans, and "All I See is Wagamama" is a piano-driven ragtime song about gentrification. Lyrically, Beans on Toast seems to have slowed down and matured, as he sings in "The War on War": "I've given up smoking cigarettes, I stopped taking cocaine too, and I don't do MDMA no more, but I do still sing that song". He's no longer tearing through life and destroying himself in the process, and it can't help but feel like a good thing at this point. It's fun to listen to somebody really throw themselves into a drugs-and-sex binge, but it's even more rewarding to hear a person grow and change. Six years out from STANDING ON A CHAIR, it feels better to know that Beans on Toast will be sticking around to keep hosting his party, as opposed to ending it prematurely.
Carter Moon
Carter Moon grew up in the desolate Evangelic capital of the world and responded by developing a taste in counter culture, which eventually bloomed into a love for filmmaking and screenwriting. Carter has average opinions on most things, but will defend them adamantly and loudly until no one else wants to bother speaking up. He runs Crossfader's podcast, IN THE CROSSHAIRS.
LOVE IS DEAD by CHVRCHES
S/T by Suicide Silence
MELIORA by Ghost
Next story VICTORIA Review
Previous story NEGATIVE FEEDBACK RESISTOR by Destruction Unit | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Next week, twenty SCUBAnauts from three Chapters (St. Petersburg, Tarpon Springs and Lake Hitchcock will be attending Capital Hill Oceans Week in Washington, DC . Capital Hill Oceans Week (CHOW), sponsored by the National Marine Sanctuary Foundation (NMSF), provides our 'nauts with a great opportunity to meet ocean explorers, science and policy leaders. In 2008, while attending this event, SCUBAnauts were invited by White House staff to meet with the First Lady Laura Bush. In 2009, the NMSF recognized SCUBAnauts International for its volunteer and environmental work. This year will have particular significance with the focus on "Clean Energy and a Healthy Ocean: Navigating the Future". The 'nauts will have the opportunity to meet and discuss these issues with members of Congress, including Congresswoman Corrine Brown, as well as ocean and energy experts. | {
"redpajama_set_name": "RedPajamaC4"
} |
Traffic patterns to change on Park Avenue, East 2nd Street
MUSCATINE, Iowa – Changes will be implemented on Monday (May 17) to the traffic patterns through the construction areas on Park Avenue and on East 2nd Street according to officials at the Department of Public Works.
Restoration and brickwork in the East 2nd Street and Sycamore Street intersection is nearly complete with the contractor anticipating opening the intersection to traffic on Monday. Lane restrictions will be implemented in the 100 block of East 2nd Street at the same time with only westbound traffic permitted through the block from Iowa to Sycamore.
There will be no parking permitted in the 100 block of East 2nd Street as the contractor begins sidewalk and pavement removal and replacement on the north half of the block. Removal and replacement on the south half of the block will begin May 31.
Pavement removal and replacement in the east half of the Washington Street and Park Avenue intersection is wrapping up along with full depth patching and sidewalk replacement on the east side of Park Avenue from East 4th Street to Washington Street. The contractor anticipates switching the intersection closure to the west half on Monday.
The contractor will also be closing traffic in the western two lanes of Park Avenue from just south of the intersection with Colorado Street through the Washington Street intersection. Two way traffic will be maintained in the eastern two lanes of Park Avenue.
Repaving of the East 2nd and Sycamore intersection has been completed with KE Flatwork, Inc., working to complete the sidewalks and Eastern Iowa Landscaping the brickwork in the intersection area. The intersection is tentatively scheduled to open May 17 to limited traffic. Once the intersection is open, work will begin on removal and replacement of the curb and gutter and the sidewalk in the 100 block of East 2nd Street starting on the north side.
There will be no parking permitted in the 100 block of East 2nd Street from May 17 through June 14. Traffic will be restricted to one lane during the sidewalk replacement and full depth patching of the roadway with eastbound traffic only May 17-31 (during work on the north side) and westbound only traffic June 1-14 (during work on south side).
The current schedule has the 100 block of East 2nd Street completed by June 15 when work will move into the East 2nd Street and Iowa Avenue intersection. The contractor anticipates the intersection being closed June 14-July 26.
PARK AVENUE 4-to-3 LANE CONVERSION
T he removal and replacement of pavement in the east half of the Washington Street and Park Avenue intersection is tentatively scheduled to be completed this week with the intersection closure moved to the west half starting Monday, May 17. Manatts, the prime contractor for the Park Avenue project, anticipates that work in the intersection will continue through at least May 24, weather permitting.
Traffic on Park Avenue is currently restricted to the western two lanes for Stage 2 work but that is expected to be completed by the weekend. The lane restriction will be switched Monday to the eastern two lanes for Stage 3 (the east side of Park Avenue from just south of Colorado through the Washington Street intersection). Two way traffic will be maintained in the eastern two lanes of Park Avenue.
Details on the intersection closure detours is available at the following links:
Closure East Side of Washington Street Intersection (PDF)
Closure West Side of Washington Street Intersection (PDF)
Washington Closure Combined (PDF)
The final stage of the project, Stage 3, includes full depth patching and traffic signal replacement in the intersection at Washington and Park Avenue, and full depth patching, curb and gutter removal and replacement, and sidewalk ADA ramps from Washington to Harrison. That work is tentatively scheduled from May 14 to August 13, weather permitting.
Milling of the old asphalt overlay and placement of a new asphalt overlay along with paint stripping from Cypress on East 2nd Street to Harrison on Park Avenue is anticipated to be completed between June 7 and August 13.
STREET & ALLEY ASPHALT OVERLAY PROJECT
Nine alley and nine street segments have been milled as part of the 2020-2021 Street & Alley Asphalt Overlay Project. The laying down of new asphalt will begin Friday with the James Place segment from Parkington Drive to the Dead End scheduled first. All work is expected to be completed by June 2, weather permitting.
Segments to be milled and paved:
Grandview Avenue Reconstruction Project
The two-year Grandview Avenue Reconstruction Project is underway with traffic restricted to northbound traffic only from Main to Musser streets. Southbound traffic will be detoured to Oregon, Stewart Road, and onto Sampson before returning to Grandview. The intersections of Oregon, Warren, and Musser will be kept open as much as possible.
Pavement removal has been completed in the southbound lanes with sanitary and storm sewer work underway. Reconstruction of the southbound lanes will begin once the underground work has been completed starting near the Pearl Street intersection.
Heuer Construction, Inc., was awarded the $7.74 million contract for the two-year Grandview Avenue Reconstruction Project that will remove and replace the pavement from Main Street to approximately 200 yards past Houser Street while adding sidewalks and additional streetscaping to provide a much more inviting corridor for residents and visitors.
Additional information on the project can be found on the City of Muscatine web site at Grandview Avenue Revitalization. A project schedule and portions of the updated plan for the corridor will be available soon on this site.
FULL DEPTH PATCHING PROJECT
The Full Depth Patching Project, part of the City of Muscatine 2020-2021 Pavement Management Program, has wrapped up on Ford Avenue and Logan Street. Work has moved to the remaining sections of the contact that two sections on Evans Street, a buckled section near the Reed Street intersection, and the approach to Bond Street. Lane restrictions will be in place for the work on Evans Street.
The final piece to be worked on as part of the current project is Fulliam from Kindler to Devitt. That work will begin after school is out.
All-American Concrete, Inc., was awarded the contract to complete the FY20-21 Full Depth Patching Program and has been working on Ford Avenue and Logan Street. The contract also calls for work on Fulliam Avenue from Kindler to Devitt but that work will not begin until the end of the school year due to the proximity to West Middle School.
WEST HILL PHASE V
Phase V of the West Hill Sanitary and Storm Sewer Separation Project is underway beginning on the property at 891 West 8th and working toward Climer Street. A lane restriction is in place on West 8th Street in front of the property at 891 West 8th Street, but the contractor anticipates the street to be open to traffic on Friday. Utility work is tentatively scheduled to move back into West 8th Street on May 24, weather permitting, and continue through July 30.
Hagerty Earthworks, Inc., was awarded the $6.03 million contract for Phase V of the WHSSP. This phase includes replacing sewers on West 8th Street from Broadway to Lucas, on Climer Street from West 8th Street to Lucas, Logan Street from Lucas to Climer, Lucas Street from 912 Lucas to Fletcher Avenue, and through the ravine between Climer and Lucas.
The first year of the two-year project will focus on West 8th Street and Climer Street.
Gov. Reynolds signs SF 562 into law
Mulberry students finish first in second Sumdog contest | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
UN-SPIDER conducts Technical Advisory Mission to Tunisia
At the request of, and in coordination with the National Civil Protection Office of Tunisia, UN-SPIDER is conducting a Technical Advisory Mission to Tunisia from 4 to 6 March 2020 to identify the needs of the country to fully take advantage of space-based information for disaster management. In order to discuss the use of space-based information for risk and disaster management to subsequently make recommendations on improvements, the expert team meets with key disaster management authorities in the country.
The mission is conducted with the support of experts from the Algerian Space Agency (ASAL); the Romanian Space Agency (ROSA); the United Nations Economic Commission for Africa (UNECA); the National Observatory of Athens (NOA); and an expert on the Copernicus Emergency Management Service. The mission team is also benefiting from the support of the Chief of Space Applications of the United Nations Office for Outer Space Affairs.
As part of the mission, the team of experts will visit several institutions including the National Office of Civil Protection; the Directorate General for Forests of the Ministry of Agriculture; the Faculty of Sciences of Tunis, University of Tunis El Manar; the National Agronomic Institute of Tunisia; the National Institute of Meteorology; as well as at the Ministry of Local Affairs and Environment. Meetings will also be conducted with representatives of the National Cartographic and Remote Sensing Centre of Tunisia and other organizations. In addition, the TAM team will meet the United Nations Country Team in Tunisia, which supports disaster management efforts in the country.
During the TAM, a workshop with over 20 participants from nine institutions will take place in order to present the UN-SPIDER programme to Tunisian counterparts involved in disaster management, and encourage inter-institutional cooperation and sharing of geospatial information among them.
UN-SPIDER aims at ensuring all countries have the capacity to use all types of space-based information to support risk and disaster management efforts. To make sure that all interested stakeholders can benefit from this information in the most effective way possible, UN-SPIDER provides Technical Advisory Support to Member States through missions such as this one.
The Algerian Space Agency (ASAL), the Romanian Space Agency (ROSA) and the National Observatory of Athens (NOA) are UN-SPIDER Regional Support Office.
Referenced UN-SPIDER Regional Support Office
Algeria Regional Support Office
Greece Regional Support Office | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Sparkle with the Grand Safari Silver earrings. Inspired in the nature found in African Safaris, these stunning climber earrings are made of 925 sterling silver and feature eight leaf shaped Mother of pearl and crystal stones.
P D PAOLA designs and produces hand-finished prêt-à-porter jewellery. A genuine collection of handcrafted pieces using premium materials and semi-precious stones. | {
"redpajama_set_name": "RedPajamaC4"
} |
We are looking for an in-home caregiver to work Monday to Thursday from 7am to 5:00pm (40 hours/wk). We live near Cambie and 14th.
While our daughter is at school, there will be housekeeping duties to perform. | {
"redpajama_set_name": "RedPajamaC4"
} |
Welcome to the NSEW Org., a free online resource and guide to science & engineering topics, events and organisations/associations in the UK. Our goal is to help scientific organisations, societies and associations reach their target audience by providing key information about their events, activities and happenings as well as general information about their work and mission. But we also seek to facilitate access to science and scientists for the UK public by providing relevant information about a variety of science & engineering related festivals, fairs, competitions, meetings, conferences, gatherings and much, much more. | {
"redpajama_set_name": "RedPajamaC4"
} |
Q: How to download a part of mp3 from server? Use Case
My use case is roughly equal to, adding a 15-second mp3 file to a ~1 min video. All transcoding merging part will be done by FFmpeg-android so that's not the concern right now.
The flow is as follows
*
*User can select any 15 seconds (ExoPlayer-streaming) of an mp3 (considering 192Kbps/44.1KHz of 3mins = up to 7MB)
*Then download ONLY the 15 second part and add it to the video's audio stream. (using FFmpeg)
*Use the obtained output
Tried solutions
*
*Extracting fragment of audio from a url
RANGE_REQUEST - I have replicated the exact same algorithm/formula in Kotlin using the exact sample file provided. But the output is not accurate (± 1.5 secs * c) where c is proportional to startTime
*How to crop a mp3 from x to x+n using ffmpeg?
FFMPEG_SS - This works flawlessly with remote URLs as input, but there are two downsides,
*
*as startTime increases, the size of downloaded bytes are closer to the actual size of the mp3.
*ffmpeg-android does not support network requests module (at least the way we complied)
So above two solutions have not been fruitful and currently, I am downloading the whole file and trimming it locally, which is definitely a bad UX.
I wonder how Instagram's music addition to story feature works because that's close to what I wanted to implement.
A: Its is not possible the way you want to do it. mp3 files do not have timestamps. If you just jump to the middle of an mp3, (and look for the frame start marker), then start decoding, You have no idea at what time this frame is for, because frames are variable size. The only way to know, is to count the number of frames before the current position. Which means you need the whole file.
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
Q: Error in loading "GaltonFamilies" dataframe in R - object not found I am using the following code to get a set of heights sampled from GaltonFamilies
set.seed(1989, sample.kind="Rounding")
library(HistData)
data("GaltonFamilies")
female_heights <- GaltonFamilies%>%
filter(gender == "female") %>%
group_by(family) %>%
sample_n(1) %>%
ungroup() %>%
select(mother, childHeight) %>%
rename(daughter = childHeight)
But then I get the following error:
"Error in eval(lhs, parent, parent) : object 'GaltonFamilies' not found"
Any ideas on what could be going on?
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
After more than two decades of research at Harvard Medical School, clinical psychologist William Pollack concludes that our sons are in trouble. In this provocative study, as he examines the causes of this crisis, Dr. Pollack offers ways we can help boys grow up into healthy adults. Just as Mary Pipher's Reviving Ophelia offers hope for troubled adolescent girls, Real Boys is an invaluable work. An unwritten "Boy Code" perpetuates the myths that boys are driven by testosterone and other uncontrollable forces and that boys are inherently dangerous. As a result of these beliefs, boys are taught to conceal their emotions from others, keep their distance in relationships, and be tough. Dr. Pollack's book offers healthier attitudes to replace this damaging Code. As Dr. Pollack discusses each of the myths of boyhood, he uses case studies to show how we can help boys understand and deal with such issues as anger, sexuality, peer pressure, and self-image. A New York Times best-seller, Real Boys provides critical information that everyone should have. | {
"redpajama_set_name": "RedPajamaC4"
} |
Oliver Masetti is a Young Professional in the World Bank's Finance, Competitiveness & Innovations Global Practice. He works on financial stability issues, including Financial Sector Assessment Programs (FSAPs) and the World Bank's engagement with the Financial Stability Board (FSB). Before joining the World Bank he worked for more than four years as an Emerging Markets economist at Deutsche Bank in Frankfurt covering countries in Sub-Saharan Africa and the MENA region. Oliver holds PhD in economics from the University of Frankfurt. | {
"redpajama_set_name": "RedPajamaC4"
} |
Gain informational edge through objective, transparent and timely geospatial analytics.
Hedge funds, asset managers, and other institutional investors can leverage Orbital Insight for novel investment opportunities and data-driven portfolio management.
Financial and physical traders, analysts and portfolio managers, petroleum producers and logistics professionals are empowered to make informed trading decisions.
GIS analysts, policymakers, and defense and intelligence professionals can make superior decisions supported by automated, scalable geospatial analytics.
The proliferation of commercial space, cloud computing and AI & machine learning have enabled Orbital Insight to catalogue the world's physical activity, driving better business and policy decisions.
Datasets today suffer from latency, sources biases and market opacity. Orbital Insight's mission is to deliver greater levels of visibility and intelligence for corporates, governments and financial investors alike.
Orbital Insight identified 42.502 million bbls of crude oil stored in Cushing, Oklahoma prior to the EIA's Jan 11, 2019 report.
Monitor Cushing inventories and 25,000 oil tanks daily.
Orbital Insight identified a 5.4% quarterly traffic decrease at Walmart before same-store sales were announced in the FY2019Q2 earnings call.
Monitor Walmart and 300,000 U.S. retail locations daily.
Orbital Insight identified an anomaly in the pattern of life at the Vostochny, Kazakhstan. New launch infrastructure was detected, providing Indications and Warnings based on land use change.
Automate and contextualize millions of geospatial data points daily.
Access and contextualize millions of raw data points, translating multiple sources of geospatial intelligence into actionable information.
Leverage multiple sources of unbiased, actionable information.
Gain firsthand knowledge of assets, normalized for contextual relevancy.
Answer your specific questions as they arise with unprecedented timeliness.
Orbital Insight ingests, interprets and analyzes multiple sources of intelligence to provide a holistic and complementary view of the world's economic and geopolitical activity.
Identify and quantify activities based on data including car, ship and aircraft counts sourced from satellite imagery.
Automate large scale land use and change detection of building, road and environmental land use from pixels.
Access daily foot traffic and key demographic trends, anonymously aggregated from billions of mobile phone pings. | {
"redpajama_set_name": "RedPajamaC4"
} |
Q: Spark development process with Python and IDE What is the standard development process involving some kind of IDE for spark with python for
*
*Data exploration on the cluster
*Application development?
I found the following answers, which do not satisfy me:
a) Zeeplin/Jupiter notbooks running "on the cluster"
b)
*
*Install Spark and PyCharm locally,
*
*use some local files containing dummy data to develope locally,
*change references in the code to some real files on the cluster,
*execute script using spark-submit in the console on the cluster.
*source: https://de.hortonworks.com/tutorial/setting-up-a-spark-development-environment-with-python/
I would love to do a) and b) using some locally installed IDE, which communicates with the cluster directly, because I dislike the idea to create local dummy files and to change the code before running it on the cluster. I would also prefer an IDE over a notebook. Is there a standard way to do this or are my answers above already "best practice"?
A: You should be able to use any IDE with PySpark. Here are some instructions for Eclipse and PyDev:
*
*set HADOOP_HOME variable referencing location of winutils.exe
*set SPARK_HOME variable referencing your local spark folder
*set SPARK_CONF_DIR to the folder where you have actual cluster config copied (spark-defaults and log4j)
*add %SPARK_HOME%/python/lib/pyspark.zip and
%SPARK_HOME%/python/lib/py4j-xx.x.zip to a PYTHONPATH of the interpreter
For the testing purposes you can add code like:
spark = SparkSession.builder.set_master("my-cluster-master-node:7077")..
With the proper configuration file in SPARK_CONF_DIR, it should work with just SparkSession.builder.getOrCreate(). Alternatively you could setup your run configurations to use spark-submit directly. Some websites with similar instructions for other IDEs include:
*
*PyCharm
*Spyder
*PyCharm & Spark
*Jupyter Notebook
*PySpark
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
Jeff specializes in working with individuals and business owners who are serious about their financial futures. In 1994, Jeff started Prentice Financial Services, Inc., an insurance and financial services company. Since he first started in the industry, Jeff has had a strong commitment to continued education, and believes it shows his commitment to his clients' success.
Jeff is a member of the Million Dollar Round Table (MDRT), the premier association of insurance and financial professionals that works to increase volunteerism and provide funds to worthy charities worldwide through the MDRT Foundation, the charitable arm of the Million Dollar Round Table.
He's been a qualifying member in 1998, 2000, 2001, 2002, and Court of the Table for 2003.
Jeff lives in Oswego, Illinois with his wife and their two daughters. In his free time he enjoys golfing, fishing, and hunting.
Education: B.S., Finance, Western Illinois University.
Credentials: Registered Representative – Securian Financial Services, Inc., Chartered Life Underwriter® (CLU®), Chartered Financial Consultant® (ChFC®), Certified Financial Planner™ professional (CFP®), and Certified Fund Specialist (CFS).
Organizations: Member National Association of Insurance and Financial Advisors (NAIFA), Member Society of Financial Service Professionals (SFSP), Member Financial Planners Association (FPA), Business Exit planning Institute (BEI), and Premier Resource Group (PRG).
Jeff Prentice is a registered representative and investment advisor representative of Securian Financial Services, Inc. Member FINRA/SIPC. Securities and investment advisory services offered through Securian Financial Services, Inc., Member FINRA/SIPC. Prentice Financial Services, 37F Stonehill Road, Oswego, Illinois 60543, is independently owned and operated. | {
"redpajama_set_name": "RedPajamaC4"
} |
Q: How to access the module of a sub package parent/
__init__.py
one/
__init__.py
module1.py
two/
__init__.py
three/
__init__.py
From this structure, I want to access module1.py
Accessing parent.one.module1 didn't work
A: You should be able to access module1 by importing the following:
import parent.one.module1
from parent.one import module1
From here, you should be able to reference the assets in module1
Let me know if this helps
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
The zerglings fought a noble battle against the samdroids held their own for many battles but were finally defeated on the EL13. Minicom Download for Linux ( deb rpm, txz xz. Download minicom packages for ALTLinux,. Rpm A text- based modem control and terminal.
You may have heard. Update Fedora 24 before doing the upgrade.
Aeperezt: 05: edit. Could you send me a link to the console- only FC23 download you used?
Fc24 modem download. Sourceforge Network Caller ID project.
I did note that FC24 is out. If that do not help then remove openssl- full- libs- 2: 1.
rpm for Fedora 25 from Fedora repository. Explore the Panasonic KX- FP206CX - Personal Fax. Home Entertainment. 6 kbps Modem Speed 64- Level Halftones Language.
Download modem- manager- gui packages for ALTLinux, Arch Linux, Debian, Fedora, Mageia, openSUSE, PCLinuxOS, ROSA, Ubuntu. ( Internet Service Provider) or other organization over a modem and phone line.
Here you can download sph d710 eg30 shared files: D710 CODE SPH D710. FC24 CL287574 REV02 user low ship.
7z from mediafire. 64 MB, Odin tar sph d710 fd24 cl451301 fd24 modem kernel rom full restore rooted from mediafire.
NCIDD not talking to Modem Forum: Help. Creator: MoxieMan. | {
"redpajama_set_name": "RedPajamaC4"
} |
Colorado has undertaken a major effort to ensure that the national parks system can be used and enjoyed by everyone. Visitor centers and restrooms are fully accessible. Because of the steep terrain in many of the parks, however, some areas are marginally accessible and others inaccessible.
All-terrain wheelchairs are available and located in parks and monuments attractions throughout the state.
Many of the parks provide a detailed accessibility brochure as well as an accessibility list on the park Web site. | {
"redpajama_set_name": "RedPajamaC4"
} |
19-27 Colonel Brook & party x x 12/15/- 12/15/- arrived at Quebec September 12th, from Halifax .... in the steamer American Eagle, were Lieut. Colonel H.G. Broke [Brook / Brock ?], D.Q.M.G. (Deputy Quarter-Master General), lady and child, of Halifax, N.S., and Captain Henderson. | {
"redpajama_set_name": "RedPajamaC4"
} |
Can someone please give us a decent live action Bane?
You know it's funny that I've seen all of these people excited to see Godzilla running at King Ghidorah in the trailer. Have they never seen a sumo match in between their Anime binge watching? Or two NFL lineman going off the ball?
I've been thinking the same thing!
So many inappropriate comments come to mind. I'll just say,"meow".
One episode in of this season. Scarecrow is not disappointing! Just wondering, will this show end up on DC's new channel next to Titans?
Godzilla! Surprised no one is talking about this more.
So, Cyborg gets to be on two teams and neither one of them are the Titans?
Okay, so I know it's almost a year away, but I'm actually having anxiety about assembling the new Hush Ivy from Sideshow. Everytime I look at it online, I can't help but wonder if I'm going to screw it up. Anyone else ever order a statue that totally bewildered them on how to put it together. Also, I hope some of the You Tubers on here will get it right for me.
So, I had a thought sitting in traffic today. Would Gladiator Hulk from Ragnarok have taken Thanos on the Asgardian ship at the beginning? Did Thor doom everyone by selfishly releasing puny Banner from Gladiator Hulk? Is Loki's blood on his hands? Heimdall? Half the universe?
Taking bets on who Tony runs into at the last minute? Galactus? Eternals? Adam Warlock? What's left of the Nova corps?
Snagged this off Ebay. Sorry for glare.
Any further info on Daredevil Netflix show?
Are they consolidating? Just one show? Defenders? | {
"redpajama_set_name": "RedPajamaC4"
} |
WHP
Several Articles in the New England Journal of Health Indicate that Swine Flu is More Dangerous For Younger People
With a worldwide pandemic under way and more than a million Americans sickened by the new swine flu, the special nature of this disease is becoming better understood.
Several articles published online Monday by the New England Journal of Medicine show that, unlike seasonal flu, the new H1N1 flu strain attacks younger people and can be more severe and deadly in that group. The reports suggest a possible vaccination policy and also account for some reasons that this strain of flu appears milder than that of other pandemics.
Source: Forbes Added by: Rob Brent
The data show that the vast majority of cases of severe pneumonia and deaths occurred among those ages between 5 and 59, which is atypical when compared with the age pattern supported by seasonal flu"
— Chowell-Puente, co-author of a new study of the A(H1N1) influenza pandemic strain circulating around the world
Source: Gilate Kano Added by: Rob Brent
NEJM Online
Swine Flu H1N1
View other events that happened on June 29
What Happened On (Day)
What Happened In (Year)
History of War
History Quizzes
The History of Us ®
©2019 McHaBu The History of Us® is a registered trademark | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
RoviSys will continue bringing independent, customer-focused process, building, and information automation solutions to the Southeast U.S. with a focus on Mission Critical Data Center, Oil & Gas, and Paper & Wood Products industries.
During the months of March and April, RoviSys experts are spending much of their time traveling to trade shows and industry events around the globe. Planning to attend one or more of these trade shows as well? Make sure to stop and say hello. We're always ready for questions and conversation about process, building, and information automation solutions that improve your business' bottom line. We especially love talking MES, IIoT, Information and Building Automation.
RoviSys is pleased to announce that Chris Otto has been promoted to Vice President, Southeast Region.
Chris joined RoviSys as an engineer in 1997 and has grown into various leadership roles. Since 2013 he has served as Southeast Regional Director, a role in which he has provided direction for the Southeast Region management team that has led to consistent growth and diversification.
RoviSys Life Sciences experts are headed to New York City for the Annual Conference at the Javitz Center. INTERPHEX is the premier pharmaceutical, biotechnology, and medical device development and manufacturing event where you can "Experience Science through Commercialization".
INTERPHEX brings together inspired professionals with key industry leaders to share knowledge and best practices, as well as see the latest cutting-edge technologies needed to cost-effectively develop and manufacture quality products. Attendees experience a combination of Technical Conference, Exhibits, Demonstrations, Business Opportunities, and Networking Events.
At Booth #3365 visitors can practice their putting, and RoviSys Life Sciences automation and information pros will share a tips to stay out of the manufacturing rough.
Paper and packaging professionals from around the world, as well as our own experts in the Paper & Wood industry will be offering expertise and solutions for your most pressing projects and questions. Stop by Booth #740 any time during the conference…here are three great reasons we think you should.
Building the Factory of the Future is difficult without the right tools. RoviSys understands the Pulp, Paper and Wood Products industry, and delivers solutions right for your business and your budget. No Vaporware, we promise.
We've earned a reputation of quality and continuity since 1989, built on technical expertise, attentive customer service, and a commitment to independence. Our engineers work in tandem with the industry's most trusted leaders: Deloitte Consulting, Microsoft, General Electric, Rockwell (Allen Bradley), Emerson DeltaV, OSIsoft, Parsec, Inductive Automation, Schneider SQD, Honeywell and ABB.
RoviSys life sciences experts will be exhibiting at the ISPE-CaSA 25th Annual Life Sciences Technology Conference in Raleigh, NC on March 13, 2018. ISPE CaSA is celebrating its 25th Annual event this year. ISPE members as well as non-members are welcome!
The conference truly represents people behind the scenes who work tirelessly to deliver drugs to patients with life-threatening illnesses. The event is a single day and is comprised of educational seminars, product demonstrations, vendor exhibits, a keynote speaker, and a networking social event.
From conference proceeds, ISPE-CaSA funds educational programs for industry and contributes financial support towards featured charities and foundations. This year's conference will capture innovative technologies and industry best practices that have been recently developed and employed to successfully meet the growing complexities of drug manufacturing.
Data Centre World, happening in London, March 21st-22, 2018 is the world's largest and best attended independent data centre event. Join RoviSys and RoviSys Building Technologies (stand D778) at this industry-leading event and hear from over 600 experts, including industry leaders, analysts and top technologists.
Over 20,000 of your peers, including hundreds of leading data centre and technology providers, and the world's brightest minds & industry practitioners will be in attendance sharing insight and inspiration.
The 2018 event will mark Data Centre World's 10th year as an industry leading event, with 10 years of recognition, 10 years of strength and 10 years of growth.
Spring 2018 Recruiting Season is Here!
RoviSys is pleased to be part of recruiting efforts at colleges and universities this spring, meeting talented software and systems engineers looking for Co-op opportunities and rewarding careers.
Our season kicks-off at the end of January with visits to Texas A&M university, The Ohio State University, and North Carolina State University. During the months of February and March, our recruiters will be at more than twenty recruiting fairs!
See the schedule of Dates and Locations here. | {
"redpajama_set_name": "RedPajamaC4"
} |
boeing model 581
All blued areas are very good to excellent. A four-engine propeller driven heavy bomber which was flown primarily by the US and UK during World War II and the Korean War. Combining the functionality of a helicopter with the long-range, high-speed performance of a turboprop aircraft. Manufacturer: Boeing: Model: A75N1(PT17) Search all Boeing A75N1(PT17) Year built: 1941: Construction Number (C/N): 75-581: Aircraft Type: Fixed wing single engine: Number of Seats: 2 Together we will innovate and operate to make the world a better place for future generations. The ashless anti corrosion additive package and the highly refined petroleum base oils protect the engine by minimizing the effects of humidity and neutralizing the acidic components of engine oil oxidation and combustion by-products. The first B-2 rolled out of the bomber's final assembly facility in Palmdale, Calif., in November 1988 and it flew for the first time on July 17, 1989. Operated by the United States Air Force since the 1950s. Includes a free display stand. Please visit website (www.fallenheroesfund.org) and help in their valiant effort". An American airborne early warning and control (AEW&C) aircraft, providing all-weather surveillance, command, control and communications. 910 W. Plainfield Road, Brookfield, This model has a length of 24.5cm and a width of 21.5cm. Have a photo of this aircraft? We work hard to keep our advertising relevant and unobtrusive to create a great experience. Register now (free) for customized features, flight alerts, and more! Meets MIL-C-6529 Type I. ROYCO 581 is a concentrated rust and corrosion preventative oil commonly used to preserve aircraft reciprocating and turbine engines. Type your part numbers (exact matches only). "We Proudly Support Intrepid Fallen Heroes Fund that serves United States Military Personal experiencing the Invisible Wounds of War : Traumatic Brain Injury (TBI) and Post Traumatic Stress (PTS). Are you looking to have it delivered Boeing is committed to serving and supporting its customers. These are full sized guns and not what used to be referred to as a boys rifle. Boeing B767-300: Planes - Flightera.net. A 1/200 scale model of a British 1952 Boeing B-29A Superfortress. Correct or submit additional aircraft data, Links to this page and other related pages, https://www.airport-data.com/manuf/Boeing.html, https://www.airport-data.com/search/search2.html?field=model&search=Search&code=Boeing+A75N1%28PT17%29. The same year, the National Aeronautic Association of the U.S.A. awarded the B-2 design team the Collier Trophy for the greatest achievement in aeronautics or astronautics in America, as demonstrated in actual use. To set up this feature, please go to My Account/Ship To Profile. Any and all trademark rights associated with the manufacturers names and products are owned by the respective manufacturers. An epic eight-part documentary series 100 years in the making. Use at your own risk. Operated by the United States Air Force since the 1950s. The B-2 stealth bomber, with its unique flying wing configuration and low-observable, radar-evading, or "stealth," technology is a versatile multi-role bomber, capable of delivering both nuclear and conventional munitions. A 1/200 diecast scale model of a US Air Force Boeing C-97A Stratofreighter. Boeing's global reach includes customers in approximately 150 countries and employees and operations in more than 65 countries. The wish list name has already existed, please change a new one. A 1/200 metal diecast scale model of a US Air Force Boeing B-52 Stratofortress Bomber. On Oct. 29, 1994, the Air Force's fourth operational B-2 was named "Spirit of Washington" in Seattle, Wash., to honor the people of the state who helped make the B-2 a reality. To change address, select an address from saved addresses. Copyright 2004-2020, Airport-Data.com. A 1/200 metal diecast scale model of a US Air Force Boeing B-52 Stratofortress Bomber. | OneTrust Cookie Settings. The sleek structure is reminiscent of the B-35, developed by Northrop during the 1940s, and uses advanced composites, such as resin-impregnated graphite fiber, rather than metal. Bringing new ideas to life through technology advancements, disruptive market strategies, and venture partnerships. ROYCO 581 is a concentrated rust and corrosion preventative oil commonly used to preserve aircraft reciprocating and turbine engines. This model has a wingspan width … See. It is operated by Delta Air Lines and its age is 18 years (built in 2002). Airport-Data.com does not guarantee the accuracy or timeliness of any information on this site. A 1/72 metal diecast scale model of a Bell Boeing V-22 Osprey. All rights reserved. Are you in the market for part numbers 68A410692-2007, 68A410665-2003, 68A410662-2001, 68A350733-2005, 68A350711-2007 from Boeing Company The? A 1/200 metal diecast scale model of a Royal Canadian Air Force Boeing C-17 Globemaster III (RCAF CC-177 Globemaster III). Please take a moment to let us know how we are doing by answering just a few questions so we can improve our service and your experience. Boeing 247 NC13300 (Boeing) 8 February 1933: Boeing test pilot Leslie R. ("Les") Tower and United Air Lines Captain Louis C. Goldsmith made the first flight of the Boeing Model 247, NX13300, a twin-engine airline transport, at Boeing Field, Seattle, Washington. Customer satisfaction is our priority. Illinois 60525, +1-708-387-7800 This product can also be used as a\u0014fly-away" oil for reciprocating engines however operation of engines preserved with the diluted material shouldbe limited to a maximum of fifty hours before oil change. If you have a couple of minutes, we'd like to collect your feedback on it. Please enter a name for the new list or select an existing. A 1/72 diecast scale model of a 1943 US Boeing P-26A Peashooter. A four-engined heavy bomber developed in the 1930s for the United States Army Air Corps (USAAC). You have not set up any Ship-to profiles or none have been selected to be displayed. The length of the plane is 54.5 m. The height of the plane is 13.56 m. The wing span is 38.05 m. This dialogue will close in 60 seconds or you can click the exit icon in the top right corner to go back to the flight map immediately. Too many planes to show. Please filter by Airline to see all planes. By using and further navigating this website, you accept this. The first flight lasted 40 minutes and Tower was quite pleased with the airplane. A 1/144 metal diecast scale model of a US 1944 Boeing B-17F Flying Fortress. Don't forget, ASAP Aero Supplies Can Respond to Your Request for Quote form Within Fifteen Minutes Or Less. This model has a wingspan width of 28.5cm and a nose-to-tail length of 25cm. Copyright © 1995 - 2020 Boeing. A 1/72 premium scale model of the Bell Boeing V-22 Osprey (US Marines, VMM-264) - Exceptionally detailed and extremely heavy, made primarily from metal with minimum plastic.
Faze Sway Fingers, Eric Thomas Sportsnet, Charleston Chew Expiration Date, Bull Terrier Cincinnati Ohio, Legacy Housing Palmerston North, Delphin Knife Screwfix, Bob Hite Height, Oh Danny Boy Meaning, Lowchen Puppies For Sale In Georgia, Polaris Ranger Doors With Crank Windows, Love Destiny Thai Drama, Chief Bromden Quotes With Page Numbers,
boeing model 581 2020 | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
You have the possibility to download PDF documents or check directly online the results and additional documents. For a print out we recommend PDF documents.
If you need club results as pdf, just open the online portal myResults (Link), search and click your own club and afterwards click on the PDF document you want to have (top right side of the club detail side). | {
"redpajama_set_name": "RedPajamaC4"
} |
Flying Blind: The 737 MAX Tragedy and the Fall of Boeing (Unabridged)
By Peter Robison
Genre: Business & Personal Finance
Flying Blind: The 737 MAX Tragedy and th Peter Robison
Summary : Flying Blind: The 737 MAX Tragedy and the Fall of Boeing (Unabridged)
A suspenseful behind-the-scenes look at the dysfunction that contributed to one of the worst tragedies in modern aviation: the 2018 and 2019 crashes of the Boeing 737 MAX. An "authoritative, gripping and finely detailed narrative that charts the decline of one of the great American companies" (New York Times Book Review), from the award-winning reporter for Bloomberg.
Boeing is a century-old titan of industry. It played a major role in the early days of commercial flight, World War II bombing missions, and moon landings. The planemaker remains a cornerstone of the U.S. economy, as well as a linchpin in the awesome routine of modern air travel. But in 2018 and 2019, two crashes of the Boeing 737 MAX 8 killed 346 people. The crashes exposed a shocking pattern of malfeasance, leading to the biggest crisis in the company's history—and one of the costliest corporate scandals ever.
How did things go so horribly wrong at Boeing?
Flying Blind is the definitive exposé of the disasters that transfixed the world. Drawing from exclusive interviews with current and former employees of Boeing and the FAA; industry executives and analysts; and family members of the victims, it reveals how a broken corporate culture paved the way for catastrophe. It shows how in the race to beat the competition and reward top executives, Boeing skimped on testing, pressured employees to meet unrealistic deadlines, and convinced regulators to put planes into service without properly equipping them or their pilots for flight. It examines how the company, once a treasured American innovator, became obsessed with the bottom line, putting shareholders over customers, employees, and communities.
By Bloomberg investigative journalist Peter Robison, who covered Boeing as a beat reporter during the company's fateful merger with McDonnell Douglas in the late '90s, this is the story of a business gone wildly off course. At once riveting and disturbing, it shows how an iconic company fell prey to a win-at-all-costs mentality, threatening an industry and endangering countless lives.
(Tags : Flying Blind: The 737 MAX Tragedy and the Fall of Boeing (Unabridged) Peter Robison Audiobook, Peter Robison Audio CD )
More by Peter Robison
Peter Robison | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Starofsky.com
Stars of show business
New stars of show business
'Jesus Christ Superstar Live in Concert' on NBC
Added 1 year ago by Admin in Superstar
NBC's Easter Sunday production of "Jesus Christ Superstar Live in Concert" was, as the young people say, doing the most.
This musical threw together glitter, sequins, leather, writhing hotties, a few big performances pitched to the last row, and camerawork that often felt as though it was hopped up on too many lattes. Actually, the ragged edges of a unifying concept did emerge over the course of the NBC musical's two-hour-and-20-minute running time: If its philosophy could be summed up in one word, "excess" would just about cover it.
That's not necessarily a bad thing. But this live show was a lot.
The musical was intensely earnest, often endearingly so. The entire cast, a multi-cultural tribe who looked as though they just left a loft party at 3 a.m. hungry for more adventure, was as energetically sincere as they could be almost all of the time. The exception was Alice Cooper, who stole the show when he emerged in an orange suit. But that adjective doesn't begin to describe what he was wearing. Cooper's threads looked like there were made out of flames — that's how vivid and pleasingly eye-popping his tailored suit was — and yet the singer easily outshone his clothes. His rendition of "King Herod's Song" was a star turn of the highest order, and a delightful amount of fun. If you can't enjoy a dapper, devilish rock-god Herod surrounded by dancing ladies clad in outfits a Vegas showgirl would kill for, then perhaps live musicals on television are just not for you. (Your loss.)
he musical played out on one big stage, which at different moments became the haunts of the ruling classes, the Garden of Gethsamene, or the hangouts of Jesus and his disciples. But despite the energy of the youthful ensemble — or perhaps due to the chorus' occasionally punishing eagerness — a lot of the best moments of "Jesus Christ Superstar Live" were solo turns.
When the center stage was occupied by former "Hamilton" cast member Brandon Victor Dixon, "Jesus Christ Superstar Live" was generally mesmerizing. Dixon gave heft, complexity and a majestic fatality to his Judas, who is perhaps the most coherent and even sympathetic character in Andrew Lloyd Webber and Tim Rice's 1970 rock opera.
Dixon's voice was piercing and urgent as he contemplated betraying Jesus, and the actor's work was stunning just before Judas committed suicide, a gut-churning act that was staged cleverly and effectively. (Judas ascended a ladder, and when the ladder fell, it was clear that he had taken his life.)
But spiritual doubts and moral struggles were often overshadowed by bursts of exuberance, even in a few places in which a more measured approach might have been called for. That said, it was hard to resist Dixon's masterful charisma when Judas returned a short time after his suicide. Rather improbably, he was accompanied by three backup singers who were made up to look like Diana Ross and the Supremes. What did a '60s girl-group vibe have to do with the final hours of Jesus of Nazareth? Well, what were showgirls in fishnets, evil rulers in long, geometrical hooded capes and a Pontius Pilate in leather pants doing in this show? Who really knows?
jesus christ superstar live, jesus christ superstar cast, jesus christ superstar live cast, nbc jesus christ superstar, nbc, cast of jesus christ superstar, cast of superstar, alice cooper jesus christ superstar, alice cooper, john legend, john legend jesus christ superstar, cast of jesus christ superstar live, who played pontius pilate in jesus christ superstar, where is jesus christ superstar being performed, chrissy teigen twitter, full cast of jesus christ superstar live, jesus christ superstar live guitarist, reviews of jesus christ superstar live, jesus christ superstar live musicians, where is jesus christ superstar live filmed
Jesus Christ Superstar Live in Concert 2018 (full concert)
NBC - Jesus Christ Superstar Live in Concert 2018 (LIVE STREAM)
BROdway: Jesus Christ Superstar LIVE in Concert
NBC - Jesus Christ Superstar Live in Concert (LIVE STREAM)
First Look - Jesus Christ Superstar Live in Concert (Sneak Peek)
A Taste of "The Last Supper" - Jesus Christ Superstar Live in Concert (Promo)
Jesus Christ Superstar Live in Concert 2018 full concert
Jesus Christ Superstar Live in Concert 2018 [ LIVE STREAM ]
Jesus Christ Superstar Live! in Concert 2018 - FULL SHOW
Jesus Christ Superstar Live in Concert 2018 [ LIVE ].
My Little Pony The Movie In Human Version 2018 ✅ Top Stars
COMO SUBIR TROFÉUS MUITO RÁPIDO NO BRAWL STARS! - DICAS DO TOP 1 GLOBAL!
TOP 13 | BRAWL STARS NEW SKIN IDEAS by GEDI-KOR
Magid Lebbar - Agent de stars
Greatest Hits Golden Oldies - 50's, 60's & 70's Best Songs (Oldies but Goodies)
Pasta Furba SuperStar Super Brillante CRUNCHY Edition di Sbabam | Nika
10 Things You Didn't Know About Rebecca (Pawn Stars)
TOP 10 STRONGEST TH11 WAR BASE LAYOUT 2018 ANTI 2 STARS BASE 2018 | ANTI EVERYTHING | CLASH OF CLANS
Bob Marley Greatest Hits Reggae Songs 2018 / Bob Marley FULL PLAYLIST 2018
Get FREE Battle Pass Tier Season 4 Week 3 Hidden Battlestar Location (Secret blockbuster #3)
Starofsky.com A video about super stars - A video about super stars of movies, TV shows and TV shows.
© 2020 Starofsky.com. All rights reserved | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
What Does Petty Officer Mean?
Lakshmipriya Nair answered
A petty officer is a non-commissioned officer in the navy in the United States and several other countries. He assists a warrant officer and his rank or position is similar to that of a sergeant in the army. There are different classes and grades of petty officers depending on the country and their naval system. A petty officer is also addressed by the abbreviated form of the word i.e. PO. Some of the other countries who have petty officers include Canada and the United Kingdom. Thus it is a marine lingo and is a Navy and coast Guard series of ranks. They have a badge or insignia which indicates the speciality and the rank of petty officer. There is a hierarchy among petty officers also. There is a senior petty officer, a chief petty officer and II or III class petty officers. All of them wear formal uniforms like the officers.
What Does `the Navy Rank Petty Officer` Mean?
Petty officer is a naval rank in most navies the world over. A petty officer is generally an officer...
What Is Petty Cash Book?
It is another cash book which is maintained, generally, in large business concerns to reduce the burden...
What Does Being Commissioned As An Officer Mean To You?
The main expectation from commissioned ensign is integrity, honor and honesty. He is expected to defend...
What Is The Different Cash Book And Petty Cash Book?
Cash book could be a checking or other type of money access account. Petty cash is money on hand....
What Is A Petty Cash Receipt?
A petty cash receipt is a receipt indicating that cash was taken from the petty cash box. Generally,...
What Is Office Assistant Meaning?
An office assistant will open post, sort mail out, get out files relating to the correspondence, file...
What Skills Does A Police Officer Need?
They need speed, strength, and lots of courage....
What Do You Mean Logistics Officer?
A Logistics Officer is an officer in the armed forces. Their role in each section of the military (Army,...
What Does Microsoft Office Do?
Microsoft office helps you in creating document files (letters), spreade sheets, presentations....
what does it mean to find a dry long dead frog in the office?
Paranormal Beliefs
Means either the frog has been there so long as to be somehow mummified, OR . . . A co-worker or after...
What Does Non-commissioned Mean?
What Does Lieutenant Mean?
What Does The Navy Do?
What Does Marshal Mean?
What Does Keir Mean?
What Does Military Rank Mean?
What Does "A/p/o" Mean When Used In The Plaintiff Section Of A Legal Claim?
Who Is A Petty Cashier?
What Are The Major Harmful Effects Of Ozone Depletion?
Is it ok to post a link in my answer on Blurtit?
Me and my best friend jack were having a conversation one day and we were staring into each others eyes and then we leaned in and suddenly we were kissing then he pulled away and mumbled a quick sorry and blushed. What do i do is he in love with me?
A State Meat Inspector In Iowa Has Been Given The Assignment Of Estimating The Mean Net Weight Of Packages Of Ground Chuck Labeled "3 Pounds." Of Course, He Realizes That The Weights Cannot Be Precisely 3 Pounds. A Sample Of 36 Packages Reveals The M
Im 14 turning 15 and i want a belly piercing how do i tell my parents i want one?
I want fish/dolphin wallpaper but not childish...styleish, ant help?
What If I Like A Guy And He Smokes But He Is Really Cute? Should I Date Him? | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Q: Running two application/script with a reboot in between without manual Intervention I have two c application running on android
say helloWorld and helloHell . I need to run both but with a reboot in between.
I have adb pushed the applications to a folder in android file system and created two scripts :
helloworld.sh and helloHell.sh
inside helloworld.sh :
./helloworld
reboot
inside helloHell.sh :
./helloHell
reboot
I have written a shell script on the host PC like this :
hell-world.sh
1->adb shell sh helloWorld.sh
2->some calculated delay
3->adb shell sh helloHell.sh
But the problem with this is after running first script (1->) the command hangs(may be due to reboot inside the helloworld.sh) and I have to manually do CTRL+C , and then manually run the second script(2->) once the reboot is over.
I even tried killing after the first script execution(1->) by doing something like this
PID =$!
kill -9 $PID
but invain,
My aim is to run both the applications with a reboot in between with no user intervention in between.The problem here is after the reboot no new command after that will be executed and have to terminate it manually.
A: Remove reboot from script file & try this
adb shell sh helloWorld.sh
adb shell reboot
# add some delay here
adb shell sh helloHell.sh
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
It's easy to see why Freshwater Bay is the most popular location for our fun-packed Family Holidays. Stunning walks follow coastal paths and trails, while the extensive grounds, outdoor heated pool an children's playground at Freshwater Bay House are great after a day out exploring.
Freshwater Bay House boasts a beautiful cliff-top location overlooking the bay. Enjoy dramatic chalk cliffs, sandy beaches, picture-postcard villages and more from this wonderful island gem.
Freshwater Bay House has 48 bedrooms located in the main building and a cottage in the grounds. Many of the rooms have sea views, whilst others overlook the gardens and downs.
Just relax and take it easy, or if you'd like to continue to chat with our guides and fellow guests then why not grab a drink or take part in one of our option evening activities.
Fridges can be supplied for medication with prior notice.
Please note that the outdoor pool is not open during October half-term breaks but our leaders will organise lots of activities before and after dinner!
The walk in a nutshell: A stroll along the coast path to Tennyson Down and the Needles. We'll return on the open-top bus with plenty of time to enjoy the pool at Freshwater Bay House.
Don't miss: See the famous sands of Alum Bay with the opportunity to descend to the beach by chair lift.
The walk in a nutshell: A fabulous walk over the chalk cliffs of Tennyson Down to the Needles and the Alum Bay; one of England's finest coastal walks.
Don't miss: Discover the once secret rocket testing range on the Needles headland, and the area's role in the space race.
The walk in a nutshell: Head to the coast at Totland Bay then soak up glorious sea view as you round the Needles headland and return over Tennyson Down.
Don't miss: The heather-clad headland of Headon Warren is a real delight, and offers the best views of the Needles.
The walk in a nutshell: A circuit of the western tip of the island. We'll follow the Yar Valley to Yarmouth, then follow the coastal path to Alum Bay, before a glorious finale over Tennyson Down.
Don't miss: The final section atop the chalk cliffs of Tennyson Down is a fitting conclusion to this splendid walk.
The walk in a nutshell: Follow the Shepherd's Trail through the fields and along an ancient trackway to Carisbrooke Castle.
Don't miss: Take time to explore this well-preserved castle. Don't forget to walk around the walls and see the donkey powered well. During the Summer there are often special events such as jousting and treasure hunts.
The walk in a nutshell: Cross the island's central hills from the picturesque village of Shorwell to the impressive castle at Carisbrooke.
Don't miss: There's lots of time to explore the castle. A real highlight is watching the donkeys turn the treadmill to raise water from the well.
The walk in a nutshell: Walk from Brightstone to the village of Shorwell village, then continue over the downs to Carisbrooke Castle.
Don't miss: Explore picturesque Shorwell with its thatched cottages and historic church. There's also plenty of time to visit Carisbrooke Castle.
The walk in a nutshell: Challenge yourself to this fantastic walk along the spine of the island from Carisbrooke Castle to Freshwater Bay. We'll cross the hills to Shorwell then pick up the Tennyson Trail which runs along the top of the chalk downs.
Don't miss: This is one of our most popular walks. There's a real sense of achievement when you cross the final hill to Freshwater Bay.
The walk in a nutshell: Walk from the Bembridge Windmill to the coastal path which we follow over the chalk headland of Culver Cliff to Sandown.
Don't miss: The walk finishes at the island's excellent Dinosaur Museum and large play area, or spend time on the beach at Sandown.
The walk in a nutshell: Walk from the historic village of Brading to the Bembridge Windmill. We'll continue atop the chalk cliffs of Culver Down, near the eastern tip of the island, and follow the coast path to Sandown.
Don't miss: The working windmill at Bembridge; one of the National Trust's smallest, but most fascinating, properties.
Don't miss: The Yarborough Monument on top of Culver Down commands a wonderful view over the Solent and English Channel.
The walk in a nutshell: Walk along the valley under the downs before ascending Brading Down and walking along the chalk ridge, enjoying the views across the Solent to the mainland. We'll continue over Culver Down and along the coastal path to Sandown.
Don't miss: There are great views over the Solent where vessels ranging from hovercraft to huge container ships complete this bustling scene.
The walk in a nutshell: Walk along the promenade from Bonchurch to Ventnor, then continue along the coast path to the lovely beach at Steephill Cove.
Don't miss: We'll stop to play in Ventnor's fantastic (and free) paddling pool, where you can paddle across the 'sea' to the minature Isle of Wight. Adults can join in or relax in the adjacent cafe.
The walk in a nutshell: Walk from Niton to the village of Whitwell. Our walk continues to the inland cliffs with good views of the Channel. We then follow the coast path to Ventnor and Steephill Cove.
Don't miss: There's plenty of time to enjoy the beach at Steephill Cove. Build sandcastles or paddle in the sea at the prettiest location on the island. Adults can enjoy a coffee and soak up the atmosphere of this nostalgic cove.
The walk in a nutshell: Soak up the sea air and views of the English Channel on a walk through the Undercliff from Niton, past Ventnor to Shanklin.
Don't miss: Discover the Undercliff; a natural sun trap, rich with verdant vegetation, created by a series of landslips over the centuries.
The walk in a nutshell: A journey along the length of Undercliff. Starting at the coastal path after Whale Chine we'll round St Catherine's Point before picking up the coastal path through Ventnor to Shanklin.
Don't miss: The cliff-top section above St Catherine's Point is particularly impressive, with views down to the lighthouse far below.
The walk in a nutshell: A gentle walk from Freshwater Bay House following the Yar Valley through a nature reserve and a disused railway line to the old harbour town of Yarmouth.
Don't miss: At Yarmouth there's time to walk on the pier, visit the castle, play on the green, or have an ice cream before returning on the open-top bus.
The walk in a nutshell: Walk beside the tidal River Yar to the historic town of Yarmouth with its bustling harbour and Tudor castle. We'll return on the opposite side of the river back to Freshwater Bay.
Don't miss: The salt marsh, reedbeds and mud flats of the Yar Estuary are a great place to see wildfowl and waders.
The walk in a nutshell: Walk atop the Downs east of Freshwater Bay. We then descend to the beach and follow the coastal path back to Freshwater Bay.
Don't miss: There's time to paddle at then beach, then enjoy the sweeping views along the island's south-west coast, as you walk over the chalk cliffs of Compton Down.
The walk in a nutshell: Walk over the Downs to the Neolithic Longstone, then descend to coast and follow the coastal path back to Freshwater Bay.
Don't miss: The Neolithic Longstone on Mottistone Down; according to legend this 13ft stone was thrown here by a giant!
Our Family and Easier Walks finish earlier in the afternoon to suit little legs - walks are not suitable for pushchairs. Easier Walks have gently undulating gradients whilst the Medium and Harder Walks have occasional steeper sections.
On some days the walks start or finish at Freshwater Bay House; on other days we use hired transport at the start and/or end of the walks. The cost of all transport to and from the walks is included in the price of your holiday.
The Isle of Wight is a delightful haven away from the bustle of the mainland, easily reached by ferry. Broadly diamond shaped, the island is 25 miles long and 15 miles wide. This makes it ideally sized for a week's walking and exploration.
Freshwater Bay is a small semi-circular cove at the foot of the garden of Freshwater Bay House. There is a pebble beach here, or better sandy beaches approximately 3 miles away at Totland Bay or Colwell Bay. Shops and banks are located in Freshwater village, about 30 minutes' walk away.
By ferry & transfer - great value!
We offer a reduced price ferry and transfer ticket - just £23 return for adults and £13 for children. This includes a foot passenger ticket for the Wightlink Lymington to Yarmouth ferry, plus a connecting taxi / coach transfer to Freshwater Bay.
Our transfers operate every Saturday and Tuesday (Friday and Monday in the low season). These connect with the 1500 or 1600 ferries from Lymington. On departure day the transfer will get you back to Yarmouth in time to catch the 0845 or 1005 ferries to the mainland.
Book your tickets at least 14 days in advance by calling our Reservations team on 020 8732 1220.
The nearest train station is Lymington Pier on the mainland. This is immediately adjacent to the ferry terminal. For train times and route planning by train visit www.nationalrail.co.uk or phone 03457 48 49 50.
From Yarmouth turn right out of the ferry terminal onto the A3054 and over the bridge across the River Yar. After 1 mile turn left down Pixley Hill, signposted to Freshwater Bay. Turn left at Freswater Garage and continue along Afton road. At the Lifeboat station turn right and follow the road round passing the Albion Hotel on the left. The entrance to Freshwater Bay House is the next driveway on your left.
From East Cowes: Follow signs for Newport following A3021 and then A3054. Continue through Newport and Carisbrooke. Turn left onto the B3401 through Calbourne. At the T junction with Afton Road (A3055) turn left and then right by the Lifeboat station and follow the road round passing the Albion Hotel on the left. The entrance to Freshwater Bay House is the next driveway on your left.
Alternatively leave your car on the mainland and travel to the Isle of Wight as a foot passenger. There is a pay and display car park at Lymington Pier - price approximately £8.50 per day.
If you're travelling from Europe the most convenient airport is at Southampton. From Southampton Airport Parkway station (adjacent to the airport terminal) there are regular trains to Lymington Pier - journey time 40 minutes). See www.nationalrail.co.uk for details.
For most guests, travelling to either London Heathrow or London Gatwick airport is the best option. See www.nationalrail.co.uk for onward connections by train to Lymington Pier. | {
"redpajama_set_name": "RedPajamaC4"
} |
Abdul Karim (second right) joins other EATOF 2018 representatives in a special photo-call. Also seen are Governor of Tottori Shinji Hirai (fourth left) and EATOF permanent secretariat secretary-general Seong Bo Yoon (fifth right).
Abdul Karim (second right) exchanges mementos with Governor of Tottori Shinji Hirai, witnessed by (from left) Mary, Jee and Hii.
KUCHING: The 16th East Asia Inter-Regional Tourism Forum (EATOF) aims to continuously develop the unique contents of this region through tourism, apart from inculcating in the current generation a responsible attitude to leave unique assets as valuable heritage for them and the next generation to discover, experience and take inspiration from.
Tourism, Arts, Culture, Youth and Sports Minister Datuk Abdul Karim Rahman Hamzah led a Sarawak delegation to attend the three-day forum in Tottori, Japan, which concluded yesterday.
He was joined by the ministry's permanent secretary Hii Chang Kee, assistant secretary Jee Chin Fu and acting Sarawak Tourism Board chief executive officer Mary Wan Mering.
This edition of EATOF, themed 'Sustainable Local Tourism Legacy Development', held various activities including the meeting of its standing committee, the 'Governor's Conference', the 'EATOF Night', the 'Travel Mart', the 'National Mountain Day' celebration, series of bilateral meetings and technical tours.
The phrase 'Discover, Experience, Inspire' was chosen as EATOF's global slogan to realise the shared goals by designating 2019-2020 as the years of 'EATOF Global Campaign'.
A joint declaration by governors of member countries was also carried out to recognise the endowed natural environmental, cultural heritage, peace and eco-tourism, which had been the strong foundation of tourism industries in the region.
In view of this, member countries would continue to pay attention and cooperate on the development of tourism programmes based on emerging themes such as sustainable conservation and development, peace and eco-tourism.
The city of Quang Ninh in Vietnam will host the 17th EATOF, in 2020. Founded in 2000, EATOF strives to pursue peace and prosperity through exchanges in diverse fields, especially tourism. It is the only international tourism association in East Asia.
Currently, EATOF has 10-member provinces – Sarawak (Malaysia), Cebu (the Philippines), Gangwon (South Korea), Jilin (China), Tuv (Mongolia), Tottori (Japan), Yogyakarta (Indonesia), Quang Ninh (Vietnam), Siem Reap (Cambodia) and Luang Prabang (Laos).
Sarawak, apart from its active participation in EATOF, would continue to leverage on its membership in several other regional cooperation platforms – namely the Brunei-Indonesia-Malaysia-Philippines East Asia Growth Area (BIMP-EAGA), Social Economic Malaysia-Indonesia (Sosek Malindo), Sabah-Sarawak-Labuan Joint Tourism Coordination and Collaboration Committee (SSLJTCC), and Sarawak-Brunei Bilateral Cooperation Tourism Working Group – to develop joint activities, marketing and promotion of tourism in the region. | {
"redpajama_set_name": "RedPajamaC4"
} |
At the Arena Summer Event on Monday 15 May, CGA's Peter Martin will chair a special debate, featuring supplier and operator panellists, that will explore the issues of supply chain and rising food prices, and discuss what suppliers and operators want to see from each other going forward.
After lunch, Mark Fox, the CEO of Bill's Restaurants, will also deliver a fascinating keynote speech and give an insight into the distinct brand heritage and successful strategy inspiring the chain's continued rapid growth.
The popular Arena, which also includes a drinks reception and superb three-course lunch prepared by the Jumeirah Carlton Tower's talented brigade, is designed to create interaction. From operators, suppliers and wholesalers to associations, charities and media, foodservice professionals from across the industry will have the opportunity to connect and discuss the important issues further.
Tickets are available to purchase now. Click here for more information and to buy tickets online or contact Lorraine Wood by email or on 07803 853 618. | {
"redpajama_set_name": "RedPajamaC4"
} |
This workshop is an introduction to Mindfulness and a way to get started with your mindfulness practice, especially if you are unable to attend the 8-week course at this time.
Mindfulness takes practice and is most skillfully developed through in-depth support and instruction. We encourage you to advance your practice after this workshop by participating in the 8-week MBSR course.
This 4-hour workshop costs $150 and offered next on May 18 at 1-5pm. Early registration prior to April May 6 is $120. | {
"redpajama_set_name": "RedPajamaC4"
} |
Coming home from work and staring down at the loving, happy eyes of our faithful dogs and furry cats, many of us have never considered what would happen to them if we died. Who would care for them? What would their lives become? A New York Estate Planning Lawyer noted that the trend of pet owners leaving guardians and trust funds to their pets before they pass on is growing People who are responsible enough to have their affairs in order for their children when they die, or people who only have children with fur or feathers, are starting to realize that their relatives are not the only ones who will be affected in the event of their death, reports the New York Estate Planning Lawyer. In many cases, it is the relatives and people that they already know that they go to first when thinking about future care for their pets. According to the New York Estate Planning Lawyer, people that already know the animals are likely candidates for trusted guardians. Not everyone who leaves money to their animals has hundreds of thousands of dollars to do so, but they can actually work out suitable arrangements for their pets ahead of time, even if it is with relatives or friends. The arrangements run from very basic to highly detailed and drafted wills and trusts, explains the New York Estate Planning Lawyer, but the end result is that the individuals leave feeling comfortable with their decision to tie up one more loose end for all of their loved ones before they go.
Thinking about the future of your family and pets is easier when you have the guidance of a reputable New York Estate Planning Attorney. In the end, the choices that we make now will have a huge impact on those we love. Call a New York Estate Planning Attorney today and start planning for the future of your family. | {
"redpajama_set_name": "RedPajamaC4"
} |
The rasta colours are recognised throughout the world as a symbol of peace and unity. Originating in the motherland Africa, pockets of England and Europe, Asia and the South Pacific as well as the Americas resonate with this message and it is has united many like minded individuals on their travels and in their everyday life.
Rasta Gear Shop has been recommending clothing and accessories in the rastafarian colours for over one and a half decades. Clothing, Shoes and Accessories in the Rasta colours have undergone a renaissance in the past twenty years. The world wide web has united everyone like never before and revolutionised printing and manufacturing. Creativity has exploded and all kinds of cultural clothing and graphics have emerged. Hip high end fashion that carries a strong message.
The younger generation is certainly getting in on the act and find a great pasta bikini, dress or skirt at this shop. For traditional rasta clothes, there are authentic Ethiopian Cotton Dresses, jewelry, Bags Belts, and accessories. Reggae trinkets are always popular and a gift for a friend can also be found at Rasta Gear Shop. Big up the colors and spread one love and inity in Jah Message. | {
"redpajama_set_name": "RedPajamaC4"
} |
MONDAY BRIEFING | Aug. 8, 2022 - Alamosa Citizen
MONDAY BRIEFING | Aug. 8, 2022
IN the Monday Briefing, 1, 2, 3, 4, 5, 6, 7 items to get your week started and a look back (above) at Del Norte's Covered Wagon Days over the weekend (C.Claire Lara photos)
1. Hunt Avenue Cultural Trail next project up
The city of Alamosa recently was awarded a $1.2 million state grant to create the Hunt Avenue Cultural Trail from Sixth to Third streets, essentially creating a walking path in the middle of downtown running south to north and leading to Cole Park and the Rio Grande. It's all part of an emerging vision for the downtown corridor of Alamosa. We connect the dots with this story.
2. Those 13,000 people headed to the Seven Peaks Festival
Alamosa Citizen reporter Owen Woods previews the upcoming Seven Peaks Festival scheduled for Labor Day weekend on a little slice of land just outside Villa Grove. With 13,000 pre-tickets sold, it'll be a gathering Saguache County and the San Luis Valley have never seen before.
3. Grizzlies open summer training camp
If you hear grunts and groans and other early-morning sounds coming from Rex Stadium later this week, it's likely the Adams State football team in their summer training camp. The Grizzlies open camp on Wednesday, Aug. 10. Under second-year head coach Jarrell Harrison, Adams State opens its 2022 season on Sept. 3 in Silver City, N.M., against Western New Mexico. The first home game is under the lights on Sept. 10 against West Texas A&M University, and Grizzlies then open Rocky Mountain Athletic Conference play at home on Sept. 17 against Colorado School of Mines. The Grizzlies' full schedule is here.
Adams State Athletics is pushing its annual Grizzly Club membership drive. The booster club membership provides passes to every athletic event at Adams State and all membership dollars are used to support scholarships for Adams State student-athletes.
4. Connecting students to careers
Alamosa High School Athletic Director Eric Melgoza noted the involvement of Ashley Lopez, a former AHS student who started her medical career as a student athletic trainer, at the annual sports physicals for Alamosa High students. Lopez was part of the team from SLV Health that provided the required athletic physicals to about 130 high school students last week. "It is great to see our former students move on from programs (Intro to Sports Medicine) offered at AHS," Melgoza said.
5. Colorado Ag Department offers STAR Soil Health Event
The Colorado Department of Agriculture, Acres U.S.A., and the Mosca-Hooper Conservation District will host the first in a series of Colorado Soil Health regional events in the San Luis Valley on Aug. 13. This free event is part of the Colorado STAR Program and will include farm tours, educational presentations, guest speakers, and a keynote address from Jimmy Emmons, a soil health champion and producer from Oklahoma.
The day will begin at 8 a.m. on Saturday, Aug. 13, in Monte Vista with brief presentations and the group will leave at 9 a.m. for two farm visits, before returning to Monte Vista for lunch. Afternoon will include breakout sessions and a panel discussion on soil health practices, which emphasize soil armor, minimal soil disturbance, plant diversity, continual live plant/root, and livestock integration. The event is free; however registration is required at ag.colorado.gov/events.
6. Cancer survivorship program seeks participants
The Adams State University Department of Kinesiology will continue important research on the effects of exercise on the physical, mental, and social health of cancer survivors. The program is currently seeking volunteers to participate in the study this fall.
The Larry Holder Exercise and Cancer Survivorship program offers cancer survivors in the San Luis Valley the opportunity to participate in an individualized exercise program conducted in a group setting which meets three times per week for 10 weeks. The program also provides Adams State undergraduate and graduate kinesiology students experience in fitness testing as well as guiding and supporting program participants throughout the exercise program.
All cancer survivors ages 18 years or older are welcome regardless of gender, type, or stage of cancer. This fall's research study begins the week of August 29 with appointments for individual fitness testing. There is no cost to the participant, but completing the entire twelve weeks of the study is essential to ensure accurate results are obtained. For more information, or for those who can't attend one of the scheduled pre-registration meetings, please contact the Adams State Kinesiology Department program coordinator: Ines Curti at 859-684-3511, email [email protected] or Peggy Johnson at 719-589-0593, email [email protected].
The program is funded through a two-year grant from the Colorado Cancer Coalition and support from the SLV Health Foundation, including the Larry Holder Memorial Golf Tournament.
7. WALK. Slow Down, Connect at 1-3 Miles per Hour
That's the title of a book by walking artist Jonathon Stalls, who is the latest guest on the Valley Pod. Naturally, he walked to our studios when in town recently and we discussed his career as a walking artist and his upcoming appearance at the Narrow Gauge Book Cooperative author series on Aug. 20. The book gets released Aug. 15. Fascinating, worthwhile conversation and then a chance to meet him later in August. The Valley Pod episode drops Tuesday on AlamosaCitizen.com and is available wherever you stream podcasts.
How water augmentation works in the San Luis Valley
Spooky folklore of the San Luis Valley | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
How to Make Your Business Stand Out with Web Analytics Services?
Digital marketing is gaining tremendous importance across all industries and within an environment where there is an immense value of ROI. Therefore, for companies, it is imperative to measure and quantify all web and social media activity to monitor the effectiveness of digital marketing campaigns and media investments. But businesses face several issues in evaluating their digital presence in the era when a strong online presence can be the key to business growth.
A recent report indicates that only 23% of companies have data-driven initiatives achieving remarkable results. 77% of marketers are still not able to report or measure how their business is performing online and how their customers react to their products or services. This is where companies need to realize the importance of web analytics services.
At Quantzig, we understand the impact that web analytics services can have on your business. And to help companies stay ahead of their competitors, our team of experts have created a comprehensive guide on web analytics services, that offer extremely helpful insights on leveraging web analytics services to improve business growth.
Web analytics services have the potential to help companies analyze and understand their brand sentiment, provide information on the competing brands and effectiveness of their promotional activities. But before we move on to the benefits of web analytics services, let's understand the definition of web analytics.
Are you wondering how to analyze the effectiveness of company communications and customer interactions on different digital marketing platforms? Customized KPIs and metrics may hold the key to success. Get in touch to know more about the benefits of our web analytics services.
Chemical manufacturing firms have historical datasets with processes and products, which can be used to discover patterns.
What is the importance of concepts like big data and analytics to the modern enterprise environment? It is "huge". The real strength of concepts like big data and analytics come from their symbiotic relationship. With improvements in the quality of data, the value of the insight generated by sophisticated analytics solutions also improves. This is specifically true in the chemical manufacturing industry, where many companies are using big data and analytics to have a new level of strategic planning that has not been available until now. Planning of resources and allocation have always been critical processes in the chemical manufacturing industry. Today, fundamental change and complexity are increasing exponentially due to globalization impact, shifting demand center towards the rising middle class in Asia, global com petition and the unprecedented influence of US unconventional oil production on raw material costs and the rapid adoption of technology to evolve business models. Thus, the analysis is very crucial as events and change unfold to be effective in responding.
Chemical manufacturing equipment like compressors and turbines have sensors that pull a continuous stream of data. This data is used by data scientists to identify patterns and predict potential breakdowns and failures of machinery, making this one of the crucial benefits of analytics. Similarly, chemical manufacturing firms can use data comparison from similar equipment to guarantee optimization of performance. Hence, chemical manufacturing firms can avoid unexpected and sudden machine shut-downs and can improve their productivity.
Since multiple dynamic operations are performed together in a chemical plant, selecting optimal operating conditions becomes very difficult. The real benefits of analytics lie in the fact that it makes use of technologies like soft sensors, which can help in processing some data points. This can further help in boosting the efficiency of energy and reduction of their costs. | {
"redpajama_set_name": "RedPajamaC4"
} |
Prospalta cyclicicoides är en fjärilsart som beskrevs av Max Wilhelm Karl Draudt 1950. Prospalta cyclicicoides ingår i släktet Prospalta och familjen nattflyn. Inga underarter finns listade i Catalogue of Life.
Källor
Nattflyn
cyclicicoides | {
"redpajama_set_name": "RedPajamaWikipedia"
} |
Vietnam War History
Reconnaissance Patrols
U.S. Army Long Range Reconnaissance Patrols (LRRP) operated deep in enemy territory, in five- and six-man teams. Their primary mission was reconnaissance, functioning as the eyes and ears of their division and keeping the Viet Cong from feeling secure. Sometimes they were asked to snatch a prisoner or two. Occasionally they were sent in to assess the damage done by a B-52 bombing strike. If no one else could get to a downed pilot, the LRRPs were called in.
Six Silent Men...Book Three: 101st LRP / Rangers (Book 3)
By Gary Linderer
The general explained that in the 101st Airborne Division, every effort was made to recover missing soldiers. He went on to say that there were five good men out there in the jungle - either dead or alive. If they were alive and not in enemy hands, they would be anxiously waiting for rescue. If dead, their bodies had to be recovered and returned to their families. All of the missing soldiers were division officers. Two helicopters had gone down no more than a couple of hundred meters apart. Intelligence had also reported that a couple of North Vietnamese battalions were active in the area over the past couple of days.
Eyes of the Eagle: F Company LRPs in Vietnam, 1968
As night descended at the bunker, self-confidence disappeared with the sunlight. The stacked rolls of concertina wire and tanglefoot to their front became their focus of attention, as they crowded at the firing ports to watch for sappers. They all stayed awake until midnight, then they decided to pull three-hour shifts; two men awake at a time. He couldn't sleep, so he stayed awake the entire night, sitting and watching the wire to their front. If the Viet Cong attacked, they wouldn't catch his bunker by surprise, that was for sure. Secretly, he wondered which one of them would be the first to break and run. He hoped it wouldn't be himself.
Acceptable Loss: An Infantry Soldier's Perspective
By Kregg P. Jorgenson
Not all of the LRRP missions continued for the scheduled five days. Many mission were cut short after there was contact with the enemy. A sudden confrontation when a team blew an ambush, then retrieved some intelligence or captured an enemy soldier who survived the ambush, would get the team lifted out. In theory, the teams were meant to serve as intelligence gatherers, spying on enemy activities and reporting that information back to division intelligence. Theory often left a great deal to the imagination: All sneaking and spying by LRRP teams was done with great caution, but it was impossible for them to remain as invisible as they would have like to.
Recondo: LRRPs in the 101st Airborne
By Larry Chambers
Did anyone have a question? One hand went up: He had heard that life expectancies in combat varied by duty assignment. The life expectancy for a door gunner in combat was said to be five seconds, and for an infantry second lieutenant it was said to be twenty seconds. What was the life expectancy for an LRP in combat? The salty NCO frowned, then a wry smile came over his face. He explained in a low voice: LRPs didn't have a life expectancy in combat. If you find yourself in combat, either "we" started it or "they" did. If you start it, they die, and if they start it, you die. The NCO added: We don't make mistakes ... we don't let them start fights.
Eyes Behind the Lines: L Company Rangers in Vietnam, 1969
And then there was our radio operator. Linderer had seen him ignore the pain caused by having a fist-sized chunk of meat blown from above his right knee. The operator had continued to brief the company commander flying above in his command and control helicopter, then he called for medevac helicopters to extract the wounded. He battled shock from the loss of blood, the entire time. Did he do this because it was his duty? No! He was inspired by love and devotion. So don't preach to us about "supreme sacrifice". These men hadn't sacrificed their lives intentionally. If a sacrifice was involved, it was due to some insensitive, incompetent brigade commander.
MIA Rescue: LRRPs in Cambodia
Millions of rounds of ammunition, and more than 100,000 mortar rounds and rockets were captured when the Viet Cong and North Vietnamese Army bases were overrun. Thousands of tons of the latest equipment and explosives were captured alongside. In one curious incident, a Lieutenant Colonel had kicked in a door to a weapons warehouse near Snuol, Cambodia, and to his surprised and amazement discovered hundreds of flintlock rifles. He realized the enemy had been assembling this stockpile for quite some time. It showed the level of Communist control over the weapons in this region - and over the local population.
LRRP Company Command: The Cav's LRP/Rangers in Vietnam, 1968-1969
The gunships were still taking fire, so the squadron commander radioed that he would bring in his own ship to pull them out. The sergeant popped a smoke grenade to guide the helicopter to the team. One by one, the four Rangers were pulled up from the jungle into the helicopter. The squadron commander held the aircraft steady throughout the entire extraction, even though small-arms fire was directed his way the entire time. As the ship was brought up and away, the sergeant took a final look down. They had killed several North Vietnamese soldiers, captured some weapons and documents, had been attacked by a far larger force, yet only one man had been wounded. They had used up a lot of good luck.
Phantom Warriors: Book I: LRRPs, LRPs, and Rangers in Vietnam
Around midnight the patrol finally set up in a tight perimeter in the middle of the jungle. The LRRPs set out their remaining claymore, were told to break out their grenades and ammo and that no one was to sleep. They remained in position and on alert through morning. At first light, two line companies assaulted into separate landing zones, then moved out towards the patrol's last reported location. Delta Company reached the team first. The LRRPs had heard them approaching from a hundred meters out and popped smoke to mark their position. One of D Company's platoon sergeants told them the rescuers had counted over fifty Viet Cong bodies on the way in.
Phantom Warriors: Book 2: More Extraordinary True Combat Stories from LRRPS, LRPS, and Rangers in Vietnam
The two finally punched a hole through the bamboo and dived over the wooden fence. As the LRRP team leader started to climb over the fence, it was shot away beneath him, sending him rolling down the hillside into a flooded rice paddy. There was no cover or concealment for several hundred meters, save for a small, brush-covered island twenty meters out in the paddy. As the three LRRPs made it to the island, the firing from above stopped altogether. They pulled out a claymore and primed it with a fifteen-second fuse so they could throw it like a giant grenade. Taking stock of their situation, they realized just how low on ammo they were. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
package kernels
import (
"fmt"
"unsafe"
"github.com/apache/arrow/go/v10/arrow"
"github.com/apache/arrow/go/v10/arrow/bitutil"
"github.com/apache/arrow/go/v10/arrow/compute/internal/exec"
"github.com/apache/arrow/go/v10/arrow/memory"
"github.com/apache/arrow/go/v10/internal/bitutils"
"golang.org/x/exp/constraints"
)
// ScalarUnary returns a kernel for performing a unary operation on
// FixedWidth types which is implemented using the passed in function
// which will receive a slice containing the raw input data along with
// a slice to populate for the output data.
//
// Note that bool is not included in exec.FixedWidthTypes since it is
// represented as a bitmap, not as a slice of bool.
func ScalarUnary[OutT, Arg0T exec.FixedWidthTypes](op func(*exec.KernelCtx, []Arg0T, []OutT) error) exec.ArrayKernelExec {
return func(ctx *exec.KernelCtx, in *exec.ExecSpan, out *exec.ExecResult) error {
arg0 := in.Values[0].Array
inData := exec.GetSpanValues[Arg0T](&arg0, 1)
outData := exec.GetSpanValues[OutT](out, 1)
return op(ctx, inData, outData)
}
}
// ScalarUnaryNotNull is for generating a kernel to operate only on the
// non-null values in the input array. The zerovalue of the output type
// is used for any null input values.
func ScalarUnaryNotNull[OutT, Arg0T exec.FixedWidthTypes](op func(*exec.KernelCtx, Arg0T, *error) OutT) exec.ArrayKernelExec {
return func(ctx *exec.KernelCtx, in *exec.ExecSpan, out *exec.ExecResult) error {
var (
arg0 = &in.Values[0].Array
arg0Data = exec.GetSpanValues[Arg0T](arg0, 1)
outPos = 0
def OutT
outData = exec.GetSpanValues[OutT](out, 1)
bitmap = arg0.Buffers[0].Buf
err error
)
bitutils.VisitBitBlocks(bitmap, arg0.Offset, arg0.Len,
func(pos int64) {
outData[outPos] = op(ctx, arg0Data[pos], &err)
outPos++
}, func() {
outData[outPos] = def
outPos++
})
return err
}
}
// ScalarUnaryBoolOutput is like ScalarUnary only it is for cases of boolean
// output. The function should take in a slice of the input type and a slice
// of bytes to fill with the output boolean bitmap.
func ScalarUnaryBoolOutput[Arg0T exec.FixedWidthTypes](op func(*exec.KernelCtx, []Arg0T, []byte) error) exec.ArrayKernelExec {
return func(ctx *exec.KernelCtx, in *exec.ExecSpan, out *exec.ExecResult) error {
arg0 := in.Values[0].Array
inData := exec.GetSpanValues[Arg0T](&arg0, 1)
return op(ctx, inData, out.Buffers[1].Buf)
}
}
// ScalarUnaryNotNullBinaryArgBoolOut creates a unary kernel that accepts
// a binary type input (Binary [offset int32], String [offset int32],
// LargeBinary [offset int64], LargeString [offset int64]) and returns
// a boolean output which is never null.
//
// It implements the handling to iterate the offsets and values calling
// the provided function on each byte slice. The provided default value
// will be used as the output for elements of the input that are null.
func ScalarUnaryNotNullBinaryArgBoolOut[OffsetT int32 | int64](defVal bool, op func(*exec.KernelCtx, []byte, *error) bool) exec.ArrayKernelExec {
return func(ctx *exec.KernelCtx, in *exec.ExecSpan, out *exec.ExecResult) error {
var (
arg0 = in.Values[0].Array
outData = out.Buffers[1].Buf
outPos = 0
arg0Offsets = exec.GetSpanOffsets[OffsetT](&arg0, 1)
arg0Data = arg0.Buffers[2].Buf
bitmap = arg0.Buffers[0].Buf
err error
)
bitutils.VisitBitBlocks(bitmap, arg0.Offset, arg0.Len,
func(pos int64) {
v := arg0Data[arg0Offsets[pos]:arg0Offsets[pos+1]]
bitutil.SetBitTo(outData, int(out.Offset)+outPos, op(ctx, v, &err))
outPos++
}, func() {
bitutil.SetBitTo(outData, int(out.Offset)+outPos, defVal)
outPos++
})
return err
}
}
// ScalarUnaryNotNullBinaryArg creates a unary kernel that accepts
// a binary type input (Binary [offset int32], String [offset int32],
// LargeBinary [offset int64], LargeString [offset int64]) and returns
// a FixedWidthType output which is never null.
//
// It implements the handling to iterate the offsets and values calling
// the provided function on each byte slice. The zero value of the OutT
// will be used as the output for elements of the input that are null.
func ScalarUnaryNotNullBinaryArg[OutT exec.FixedWidthTypes, OffsetT int32 | int64](op func(*exec.KernelCtx, []byte, *error) OutT) exec.ArrayKernelExec {
return func(ctx *exec.KernelCtx, in *exec.ExecSpan, out *exec.ExecResult) error {
var (
arg0 = &in.Values[0].Array
outData = exec.GetSpanValues[OutT](out, 1)
outPos = 0
arg0Offsets = exec.GetSpanOffsets[OffsetT](arg0, 1)
def OutT
arg0Data = arg0.Buffers[2].Buf
bitmap = arg0.Buffers[0].Buf
err error
)
bitutils.VisitBitBlocks(bitmap, arg0.Offset, arg0.Len,
func(pos int64) {
v := arg0Data[arg0Offsets[pos]:arg0Offsets[pos+1]]
outData[outPos] = op(ctx, v, &err)
outPos++
}, func() {
outData[outPos] = def
outPos++
})
return err
}
}
// ScalarUnaryBoolArg is like ScalarUnary except it specifically expects a
// function that takes a byte slice since booleans arrays are represented
// as a bitmap.
func ScalarUnaryBoolArg[OutT exec.FixedWidthTypes](op func(*exec.KernelCtx, []byte, []OutT) error) exec.ArrayKernelExec {
return func(ctx *exec.KernelCtx, input *exec.ExecSpan, out *exec.ExecResult) error {
outData := exec.GetSpanValues[OutT](out, 1)
return op(ctx, input.Values[0].Array.Buffers[1].Buf, outData)
}
}
// SizeOf determines the size in number of bytes for an integer
// based on the generic value in a way that the compiler should
// be able to easily evaluate and create as a constant.
func SizeOf[T constraints.Integer]() uint {
x := uint16(1 << 8)
y := uint32(2 << 16)
z := uint64(4 << 32)
return 1 + uint(T(x))>>8 + uint(T(y))>>16 + uint(T(z))>>32
}
// MinOf returns the minimum value for a given type since there is not
// currently a generic way to do this with Go generics yet.
func MinOf[T constraints.Integer]() T {
if ones := ^T(0); ones < 0 {
return ones << (8*SizeOf[T]() - 1)
}
return 0
}
// MaxOf determines the max value for a given type since there is not
// currently a generic way to do this for Go generics yet as all of the
// math.Max/Min values are constants.
func MaxOf[T constraints.Integer]() T {
ones := ^T(0)
if ones < 0 {
return ones ^ (ones << (8*SizeOf[T]() - 1))
}
return ones
}
func getSafeMinSameSign[I, O constraints.Integer]() I {
if SizeOf[I]() > SizeOf[O]() {
return I(MinOf[O]())
}
return MinOf[I]()
}
func getSafeMaxSameSign[I, O constraints.Integer]() I {
if SizeOf[I]() > SizeOf[O]() {
return I(MaxOf[O]())
}
return MaxOf[I]()
}
func getSafeMaxSignedUnsigned[I constraints.Signed, O constraints.Unsigned]() I {
if SizeOf[I]() <= SizeOf[O]() {
return MaxOf[I]()
}
return I(MaxOf[O]())
}
func getSafeMaxUnsignedSigned[I constraints.Unsigned, O constraints.Signed]() I {
if SizeOf[I]() < SizeOf[O]() {
return MaxOf[I]()
}
return I(MaxOf[O]())
}
func getSafeMinMaxSigned[T constraints.Signed](target arrow.Type) (min, max T) {
switch target {
case arrow.UINT8:
min, max = 0, getSafeMaxSignedUnsigned[T, uint8]()
case arrow.UINT16:
min, max = 0, getSafeMaxSignedUnsigned[T, uint16]()
case arrow.UINT32:
min, max = 0, getSafeMaxSignedUnsigned[T, uint32]()
case arrow.UINT64:
min, max = 0, getSafeMaxSignedUnsigned[T, uint64]()
case arrow.INT8:
min = getSafeMinSameSign[T, int8]()
max = getSafeMaxSameSign[T, int8]()
case arrow.INT16:
min = getSafeMinSameSign[T, int16]()
max = getSafeMaxSameSign[T, int16]()
case arrow.INT32:
min = getSafeMinSameSign[T, int32]()
max = getSafeMaxSameSign[T, int32]()
case arrow.INT64:
min = getSafeMinSameSign[T, int64]()
max = getSafeMaxSameSign[T, int64]()
}
return
}
func getSafeMinMaxUnsigned[T constraints.Unsigned](target arrow.Type) (min, max T) {
min = 0
switch target {
case arrow.UINT8:
max = getSafeMaxSameSign[T, uint8]()
case arrow.UINT16:
max = getSafeMaxSameSign[T, uint16]()
case arrow.UINT32:
max = getSafeMaxSameSign[T, uint32]()
case arrow.UINT64:
max = getSafeMaxSameSign[T, uint64]()
case arrow.INT8:
max = getSafeMaxUnsignedSigned[T, int8]()
case arrow.INT16:
max = getSafeMaxUnsignedSigned[T, int16]()
case arrow.INT32:
max = getSafeMaxUnsignedSigned[T, int32]()
case arrow.INT64:
max = getSafeMaxUnsignedSigned[T, int64]()
}
return
}
func intsCanFit(data *exec.ArraySpan, target arrow.Type) error {
if !arrow.IsInteger(target) {
return fmt.Errorf("%w: target type is not an integer type %s", arrow.ErrInvalid, target)
}
switch data.Type.ID() {
case arrow.INT8:
min, max := getSafeMinMaxSigned[int8](target)
return intsInRange(data, min, max)
case arrow.UINT8:
min, max := getSafeMinMaxUnsigned[uint8](target)
return intsInRange(data, min, max)
case arrow.INT16:
min, max := getSafeMinMaxSigned[int16](target)
return intsInRange(data, min, max)
case arrow.UINT16:
min, max := getSafeMinMaxUnsigned[uint16](target)
return intsInRange(data, min, max)
case arrow.INT32:
min, max := getSafeMinMaxSigned[int32](target)
return intsInRange(data, min, max)
case arrow.UINT32:
min, max := getSafeMinMaxUnsigned[uint32](target)
return intsInRange(data, min, max)
case arrow.INT64:
min, max := getSafeMinMaxSigned[int64](target)
return intsInRange(data, min, max)
case arrow.UINT64:
min, max := getSafeMinMaxUnsigned[uint64](target)
return intsInRange(data, min, max)
default:
return fmt.Errorf("%w: invalid type for int bounds checking", arrow.ErrInvalid)
}
}
func intsInRange[T exec.IntTypes | exec.UintTypes](data *exec.ArraySpan, lowerBound, upperBound T) error {
if MinOf[T]() >= lowerBound && MaxOf[T]() <= upperBound {
return nil
}
isOutOfBounds := func(val T) bool {
return val < lowerBound || val > upperBound
}
isOutOfBoundsMaybeNull := func(val T, isValid bool) bool {
return isValid && (val < lowerBound || val > upperBound)
}
getError := func(val T) error {
return fmt.Errorf("%w: integer value %d not in range: %d to %d",
arrow.ErrInvalid, val, lowerBound, upperBound)
}
values := exec.GetSpanValues[T](data, 1)
bitmap := data.Buffers[0].Buf
bitCounter := bitutils.NewOptionalBitBlockCounter(bitmap, data.Offset, data.Len)
pos, offsetPos := 0, data.Offset
for pos < int(data.Len) {
block := bitCounter.NextBlock()
outOfBounds := false
if block.Popcnt == block.Len {
// fast path: branchless
i := 0
for chunk := 0; chunk < int(block.Len)/8; chunk++ {
for j := 0; j < 8; j++ {
outOfBounds = outOfBounds || isOutOfBounds(values[i])
i++
}
}
for ; i < int(block.Len); i++ {
outOfBounds = outOfBounds || isOutOfBounds(values[i])
}
} else if block.Popcnt > 0 {
// values may be null, only bounds check non-null vals
i := 0
for chunk := 0; chunk < int(block.Len)/8; chunk++ {
for j := 0; j < 8; j++ {
outOfBounds = outOfBounds || isOutOfBoundsMaybeNull(
values[i], bitutil.BitIsSet(bitmap, int(offsetPos)+i))
i++
}
}
for ; i < int(block.Len); i++ {
outOfBounds = outOfBounds || isOutOfBoundsMaybeNull(
values[i], bitutil.BitIsSet(bitmap, int(offsetPos)+i))
}
}
if outOfBounds {
if data.Nulls > 0 {
for i := 0; i < int(block.Len); i++ {
if isOutOfBoundsMaybeNull(values[i], bitutil.BitIsSet(bitmap, int(offsetPos)+i)) {
return getError(values[i])
}
}
} else {
for i := 0; i < int(block.Len); i++ {
if isOutOfBounds(values[i]) {
return getError(values[i])
}
}
}
}
values = values[block.Len:]
pos += int(block.Len)
offsetPos += int64(block.Len)
}
return nil
}
type numeric interface {
exec.IntTypes | exec.UintTypes | constraints.Float
}
func memCpySpan[T numeric](in, out *exec.ArraySpan) {
inData := exec.GetSpanValues[T](in, 1)
outData := exec.GetSpanValues[T](out, 1)
copy(outData, inData)
}
func castNumberMemCpy(in, out *exec.ArraySpan) {
switch in.Type.ID() {
case arrow.INT8:
memCpySpan[int8](in, out)
case arrow.UINT8:
memCpySpan[uint8](in, out)
case arrow.INT16:
memCpySpan[int16](in, out)
case arrow.UINT16:
memCpySpan[uint16](in, out)
case arrow.INT32:
memCpySpan[int32](in, out)
case arrow.UINT32:
memCpySpan[uint32](in, out)
case arrow.INT64:
memCpySpan[int64](in, out)
case arrow.UINT64:
memCpySpan[uint64](in, out)
case arrow.FLOAT32:
memCpySpan[float32](in, out)
case arrow.FLOAT64:
memCpySpan[float64](in, out)
}
}
func castNumberToNumberUnsafe(in, out *exec.ArraySpan) {
if in.Type.ID() == out.Type.ID() {
castNumberMemCpy(in, out)
return
}
inputOffset := in.Type.(arrow.FixedWidthDataType).Bytes() * int(in.Offset)
outputOffset := out.Type.(arrow.FixedWidthDataType).Bytes() * int(out.Offset)
castNumericUnsafe(in.Type.ID(), out.Type.ID(), in.Buffers[1].Buf[inputOffset:], out.Buffers[1].Buf[outputOffset:], int(in.Len))
}
func maxDecimalDigitsForInt(id arrow.Type) (int32, error) {
switch id {
case arrow.INT8, arrow.UINT8:
return 3, nil
case arrow.INT16, arrow.UINT16:
return 5, nil
case arrow.INT32, arrow.UINT32:
return 10, nil
case arrow.INT64:
return 19, nil
case arrow.UINT64:
return 20, nil
}
return -1, fmt.Errorf("%w: not an integer type: %s", arrow.ErrInvalid, id)
}
func ResolveOutputFromOptions(ctx *exec.KernelCtx, _ []arrow.DataType) (arrow.DataType, error) {
opts := ctx.State.(CastState)
return opts.ToType, nil
}
var OutputTargetType = exec.NewComputedOutputType(ResolveOutputFromOptions)
func resolveToFirstType(_ *exec.KernelCtx, args []arrow.DataType) (arrow.DataType, error) {
return args[0], nil
}
var OutputFirstType = exec.NewComputedOutputType(resolveToFirstType)
type validityBuilder struct {
mem memory.Allocator
buffer *memory.Buffer
data []byte
bitLength int
falseCount int
}
func (v *validityBuilder) Resize(n int64) {
if v.buffer == nil {
v.buffer = memory.NewResizableBuffer(v.mem)
}
v.buffer.ResizeNoShrink(int(bitutil.BytesForBits(n)))
v.data = v.buffer.Bytes()
}
func (v *validityBuilder) Reserve(n int64) {
if v.buffer == nil {
v.buffer = memory.NewResizableBuffer(v.mem)
}
v.buffer.Reserve(v.buffer.Cap() + int(bitutil.BytesForBits(n)))
v.data = v.buffer.Buf()
}
func (v *validityBuilder) UnsafeAppend(val bool) {
bitutil.SetBitTo(v.data, v.bitLength, val)
if !val {
v.falseCount++
}
v.bitLength++
}
func (v *validityBuilder) UnsafeAppendN(n int64, val bool) {
bitutil.SetBitsTo(v.data, int64(v.bitLength), n, val)
if !val {
v.falseCount += int(n)
}
v.bitLength += int(n)
}
func (v *validityBuilder) Append(val bool) {
v.Reserve(1)
v.UnsafeAppend(val)
}
func (v *validityBuilder) AppendN(n int64, val bool) {
v.Reserve(n)
v.UnsafeAppendN(n, val)
}
func (v *validityBuilder) Finish() (buf *memory.Buffer) {
if v.bitLength > 0 {
v.buffer.Resize(int(bitutil.BytesForBits(int64(v.bitLength))))
}
v.bitLength, v.falseCount = 0, 0
buf = v.buffer
v.buffer = nil
return
}
type execBufBuilder struct {
mem memory.Allocator
buffer *memory.Buffer
data []byte
sz int
}
func (bldr *execBufBuilder) resize(newcap int) {
if bldr.buffer == nil {
bldr.buffer = memory.NewResizableBuffer(bldr.mem)
}
bldr.buffer.ResizeNoShrink(newcap)
bldr.data = bldr.buffer.Bytes()
}
func (bldr *execBufBuilder) reserve(additional int) {
if bldr.buffer == nil {
bldr.buffer = memory.NewResizableBuffer(bldr.mem)
}
mincap := bldr.sz + additional
if mincap <= cap(bldr.data) {
return
}
bldr.buffer.ResizeNoShrink(mincap)
bldr.data = bldr.buffer.Buf()
}
func (bldr *execBufBuilder) unsafeAppend(data []byte) {
copy(bldr.data[bldr.sz:], data)
bldr.sz += len(data)
}
func (bldr *execBufBuilder) unsafeAppendN(n int, val byte) {
bldr.data[bldr.sz] = val
for i := 1; i < n; i *= 2 {
copy(bldr.data[bldr.sz+i:], bldr.data[bldr.sz:bldr.sz+i])
}
bldr.sz += n
}
func (bldr *execBufBuilder) append(data []byte) {
if bldr.sz+len(data) > cap(bldr.data) {
bldr.resize(bldr.sz + len(data))
}
bldr.unsafeAppend(data)
}
func (bldr *execBufBuilder) appendN(n int, val byte) {
bldr.reserve(n)
bldr.unsafeAppendN(n, val)
}
func (bldr *execBufBuilder) advance(n int) {
bldr.reserve(n)
bldr.sz += n
}
func (bldr *execBufBuilder) unsafeAdvance(n int) {
bldr.sz += n
}
func (bldr *execBufBuilder) finish() (buf *memory.Buffer) {
if bldr.buffer == nil {
buf = memory.NewBufferBytes(nil)
return
}
bldr.buffer.Resize(bldr.sz)
buf = bldr.buffer
bldr.buffer, bldr.sz = nil, 0
return
}
type bufferBuilder[T exec.FixedWidthTypes] struct {
execBufBuilder
zero T
}
func newBufferBuilder[T exec.FixedWidthTypes](mem memory.Allocator) *bufferBuilder[T] {
return &bufferBuilder[T]{
execBufBuilder: execBufBuilder{
mem: mem,
},
}
}
func (b *bufferBuilder[T]) reserve(additional int) {
b.execBufBuilder.reserve(additional * int(unsafe.Sizeof(b.zero)))
}
func (b *bufferBuilder[T]) resize(newcap int) {
b.execBufBuilder.resize(newcap * int(unsafe.Sizeof(b.zero)))
}
func (b *bufferBuilder[T]) unsafeAppend(value T) {
b.execBufBuilder.unsafeAppend(exec.GetBytes([]T{value}))
}
func (b *bufferBuilder[T]) unsafeAppendN(n int, value T) {
data := exec.GetData[T](b.data)[b.len():]
b.execBufBuilder.unsafeAdvance(n * int(unsafe.Sizeof(value)))
data[0] = value
for i := 1; i < n; i *= 2 {
copy(data[i:], data[:i])
}
}
func (b *bufferBuilder[T]) unsafeAppendSlice(values []T) {
b.execBufBuilder.unsafeAppend(exec.GetBytes(values))
}
func (b *bufferBuilder[T]) advance(n int) {
b.execBufBuilder.advance(n * int(unsafe.Sizeof(b.zero)))
}
func (b *bufferBuilder[T]) append(value T) {
b.execBufBuilder.append(exec.GetBytes([]T{value}))
}
func (b *bufferBuilder[T]) len() int { return b.sz / int(unsafe.Sizeof(b.zero)) }
func (b *bufferBuilder[T]) appendN(n int, value T) {
b.reserve(n + b.len())
b.unsafeAppendN(n, value)
}
func (b *bufferBuilder[T]) appendSlice(values []T) {
b.execBufBuilder.append(exec.GetBytes(values))
}
func (b *bufferBuilder[T]) cap() int {
return cap(b.data) / int(unsafe.Sizeof(b.zero))
}
func checkIndexBoundsImpl[T exec.IntTypes | exec.UintTypes](values *exec.ArraySpan, upperLimit uint64) error {
// for unsigned integers, if the values array is larger
// than the maximum index value, then there's no need to bounds check
isSigned := !arrow.IsUnsignedInteger(values.Type.ID())
if !isSigned && upperLimit > uint64(MaxOf[T]()) {
return nil
}
valuesData := exec.GetSpanValues[T](values, 1)
bitmap := values.Buffers[0].Buf
isOutOfBounds := func(val T) bool {
return ((isSigned && val < 0) || val >= 0 && uint64(val) >= upperLimit)
}
return bitutils.VisitSetBitRuns(bitmap, values.Offset, values.Len,
func(pos, length int64) error {
outOfBounds := false
for i := int64(0); i < length; i++ {
outOfBounds = outOfBounds || isOutOfBounds(valuesData[pos+i])
}
if outOfBounds {
for i := int64(0); i < length; i++ {
if isOutOfBounds(valuesData[pos+i]) {
return fmt.Errorf("%w: %d out of bounds",
arrow.ErrIndex, valuesData[pos+i])
}
}
}
return nil
})
}
func checkIndexBounds(values *exec.ArraySpan, upperLimit uint64) error {
switch values.Type.ID() {
case arrow.INT8:
return checkIndexBoundsImpl[int8](values, upperLimit)
case arrow.UINT8:
return checkIndexBoundsImpl[uint8](values, upperLimit)
case arrow.INT16:
return checkIndexBoundsImpl[int16](values, upperLimit)
case arrow.UINT16:
return checkIndexBoundsImpl[uint16](values, upperLimit)
case arrow.INT32:
return checkIndexBoundsImpl[int32](values, upperLimit)
case arrow.UINT32:
return checkIndexBoundsImpl[uint32](values, upperLimit)
case arrow.INT64:
return checkIndexBoundsImpl[int64](values, upperLimit)
case arrow.UINT64:
return checkIndexBoundsImpl[uint64](values, upperLimit)
default:
return fmt.Errorf("%w: invalid index type for bounds checking", arrow.ErrInvalid)
}
}
func checkIndexBoundsChunked(values *arrow.Chunked, upperLimit uint64) error {
var span exec.ArraySpan
for _, v := range values.Chunks() {
span.SetMembers(v.Data())
if err := checkIndexBounds(&span, upperLimit); err != nil {
return err
}
}
return nil
}
| {
"redpajama_set_name": "RedPajamaGithub"
} |
Wrath of Stormheart "the trouble with Lumie"
The main one is after the "The Trouble with Lumie" quest is that the next quest and cutscene do not appear, i have no way with pogressing with questline then.
I have not seen anyone talk about this bug yet.
So Stormheart appears with the seashocker then wartihod Said something and then the quest stopped right?
Ok so what you need to do is: exit game then again enter and stop when theres screen with all your vikings. So now dont click play, click the map and click lookout and talk to Wartihod in lookout. Then back to Vanaheim and everything will be ok.
The thing is that she doesn't appear at all after getting back to the surface with Lumie, that's why im stuck.
It isn't just with the wrath of stormheart, it's also with the rise of stormheart as well. I also believe it's the Titan Wing Speed Stinger update that actually caused the Dragon Tactics problems for both expansion packs. For me the problem is in the rise of stormheart expansion pack, you complete the Dragon Tactics battle, but it doesn't register you did, keep trying it, still doesn't work, so you can't even progress in the expansion pack, this also has been happening in the wrath of stormheart. Just give the admins time, they'll fix it eventually, besides, this has been happening for 4 or 5 days, and I made multiple forums ranting about this, heck I even sent the support time an email about the new bug. Anyway, let's not rush them though, time fixes things, so they'll fix it eventually, plus I'm pretty sure they're trying to fix the chat.
That's exactly why i made the thread, so i can get help from an admin about this.
Managed to finally fix all this though as the well known "dragon tactics" bug goes, i'm absolutely stuck and the quest won't progress no matter how many times i play the dragon tactics quest.
This also goes for the Astrid dragon tactics quest in rise of stormheart. | {
"redpajama_set_name": "RedPajamaC4"
} |
Electrical outlets are a premium commodity in facilities that were built before the increased power demands of the modern workplace. Unfortunately, this causes individuals to improvise "quick fixes", such as using extension cords in place of permanent wiring. The unsafe conditions that result, are marked by devastating fires costing many lives and millions of dollars in damages.
Extension cords are designed by the manufacturers for temporary service only. Permanent use is not acceptable. "Temporary" means seasonal use or short periods of hours to weeks. Examples of temporary use include holiday decorations, a piece of equipment set up for a week, or using the appliance for a quick task. An extension cord is considered "in use" if it is plugged in, even though the equipment is not turned on.
With tight budgets and limitations on electrical services to some locations, addressing the electrical needs of the office or work area can be difficult. The best answers are to locate the appliance near an existing outlet, or have an electrical outlet installed where it is needed. A single multi-outlet power strip can be used as an alternative to extension cords, even for long time periods. See the guidelines for multi outlet power strips below.
All extension cords must be UL approved.
Fabricated (home-made or shop-made) extension cords are NOT acceptable.
Select extension cords that are rated to handle the power requirements of the equipment. If the wire thickness of the extension cord is smaller than the wire thickness of the equipment cord, the extension cord is probably an inappropriate choice.
Adapters that go from three-prong to two-prong plugs eliminate the protection that the manufacturer provided by installing electrical grounding in the equipment design. Use of the adapters increases the risk of electrical shock to the user.
Check all electrical cords and plugs to make sure they are in good condition, without splices, tape, sharply bent or pinched.
Make sure 3-prong plugs are not altered and that the ground prong is not removed.
Electrical cords should never run through walls, ceiling, doors, under rugs or across traffic lanes.
Never use more than one extension cord in any connection.
During recent fire safety inspections, multi-outlet power strips are often found on the floor or unattached to work surfaces, which makes this condition a common problem noted in the inspection reports. Many multi-outlet power strips have a fragile internal connection that can be damaged by repeated movement or jarring. Fires have resulted when this connection is damaged, so it is important that the strips be above the floor and mounted to a fixed surface, such as a wall or cabinet.
The safest type of power strip will have a fuse or reset button to prevent power overloads.
Multi-outlet assemblies with built in surge protection are the preferred strip for computer usage.
It is easy to exceed the capacity of the power strip and the circuit, so use some caution when adding multiple appliances to the strip.
Do not use adapters or extension cords between the strip and the outlet.
Never plug one power strip into a second power strip or into an extension cord.
Periodically inspect the condition of the power strip, including the cord and plug, test the reset button, and make sure all plugs are firmly inserted into the outlets. If the power strip feels hot, or if a defect is found, discard the power strip and replace with a new one.
Extension cords are allowed only for temporary installations (hours - days). Multi-outlet strips are built to be used for extended periods, and can be a safe substitute for an extension cord if installed properly.
Normally, the outlet strips will come with hardware or heavy duty double faced tape for mounting. | {
"redpajama_set_name": "RedPajamaC4"
} |
Dan Wootton just confirmed that the Love is Easy video will be premiered on TV this thursday, october 25th but we don't know in which channel yet.
The lads of @mcflymusic have just given me a sneaky look at their new music video. It's really cute and a brilliant song.Premieres Thursday. | {
"redpajama_set_name": "RedPajamaC4"
} |
Read about Gaudenzia's leaders
Combined, Gaudenzia's executive leadership team has more than 200 years of experience in their respective fields of study and practice. We are proud to attract some of the best and brightest in the field to help us fulfill our mission of helping individuals with substance abuse problems.
Dale Klatzker, PhD
Chief Executive Officer, Gaudenzia, Inc.
With over 40 years of exemplary leadership experience in the area of Behavioral Healthcare, Dr. Dale Klatzker has been recognized on nationally for his visionary leadership and innovative contributions to the field. As the Chief Executive Officer, Dr. Klatzker brings a wealth of knowledge, skills and leadership to Gaudenzia that will continue to impact the lives of thousands of people every day.
Michael B. Harle, MHS
President, Gaudenzia, Inc.
Michael Harle is the President of Gaudenzia, Inc. Mr. Harle began his career in 1973 as a chemical dependency counselor, and shortly after, developed drug and alcohol treatment programs in three state correctional institutions in Pennsylvania. He received his Master's Degree in Human Services from Lincoln University in 1978 and holds a certificate in Non-Profit Management from Harvard University Business School.
Gadi Aronson, MSW
Gadi Aronson has been with Gaudenzia since 2004 and has more than 25 years experience in fundraising. Mr. Aronson is responsible for all aspects of fundraising and public relations for the organization.
Cecilia Velasquez, MHS
Director of the Eastern Region
Cecilia Velasquez has been with Gaudenzia since 1981 and has been in the field of human services since 1974. Ms. Velasquez has worked with diverse populations including chemical dependency, women/women, and children, victims of domestic/sexual violence, dual diagnosis, homeless, community corrections, and prisons.
John G. DiLeonardo, Esq.
Counsel and Director of Compliance
John DiLeonardo serves as Gaudenzia's Counsel and Director of Compliance. He holds a Bachelor of Arts in Political Science from Washington & Jefferson College (1976) and a Juris Doctor from the University of Dayton School of Law (1979), where he was elected to the Order of the Barristers for superior achievement in courtroom advocacy. John has an extensive background in health care law. He has prosecuted and tried healthcare related and other cases in the Pennsylvania State Courts as well as in Federal Courts sitting in Pennsylvania and in Florida. His work experience includes serving as Pennsylvania Chief Deputy Attorney General for Medicaid/Healthcare prosecutions; as Prosecuting Attorney for the State Board of Medicine in Pennsylvania; and in private practice where he represented clients in civil, criminal, and administrative litigation matters.
Sharon Johnson, MBA, SHRM-SCP
Sharon Johnson has been with Gaudenzia for a combined total of 29 years and serves as the lead Human Resource professional for Gaudenzia. Sharon manages the full spectrum of human resources and personnel services for over 1200 full & part time employees. Sharon began her career at Gaudenzia in 1990. Since then, she has held several leadership positions within the Finance and Human Resource departments.
Sharon holds a Senior Certified Professional Human Resource Certification, (SHRM-SCP) from the Society for Human Resource Professionals, a Master's Degree in Human Resources from Walden University, and a Bachelor's Degree in Accounting from Temple University's Fox School of Business.
Erin Pressel, MS, MBA, CCJP, CCDP
Erin Pressel has worked in the Human Services field for over fifteen years in many different capacities in both the mental health and drug and alcohol systems. During her career, she has been a residential counselor working with at-risk youth, a mental health intensive case manager, a drug and alcohol counselor and a county case management specialist. She holds a B.S. from the University of Massachusetts at Lowell in Criminal Justice with a minor in Psychology, an M.S. from California University of Pennsylvania in Legal Studies with a concentration in Homeland Security and an MBA in Marketing from Columbia Southern University.
Mark Sarneso, MS
Director of the Central and Western Region
Mark Sarneso holds a B.A. from York College of Pennsylvania and an M.S. from the University of Pittsburgh's School of Social Work with a concentration in Child and Adolescent Development. He has over 35 years of increasingly responsible management positions in the behavioral health field. Mark also has extensive experience in advocacy of public policy, as he was Chairman of DASPOP (Drug and Alcohol Service Providers of Pennsylvania) for 17 years. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Dzieci mogą rywalizować w dywizjach wagowych Gi i No Gi za jedyne 50 €.
Dorośli mogą rywalizować w dywizjach wagowych Gi i No Gi oraz w Open za jedyne 50 €.
Dzieci w wieku 4-6 lat mają 1/2 ceny!
Join #TeamAGF as a SPONSORED athlete!
The AGF is our first visit to Berlin on May 18th.
All extra divisions are FREE!
Kids can compete in Gi and No Gi weight divisions for only €50.
Adults can compete in Gi and No Gi weight divisions AND both Absolute divisions for only €50.
Kids ages 4-6 years old are 1/2 price!
VERY IMPORTANT / When registering, make sure your team name matches the rest of your team so your points are added correctly. | {
"redpajama_set_name": "RedPajamaC4"
} |
Transparency and Operations Blog
Fall 2017 Editorial Board: USC must proactively combat harassment
By DAILY TROJAN FALL 2017 EDITORIAL BOARD
October 13, 2017 1 Comment/in From the Editors, Opinion
On Tuesday, following startling reports that multi-millionaire Hollywood producer Harvey Weinstein had sexually harassed and assaulted women for years, USC announced that it would decline a gift of $5 million from Weinstein. Weinstein had pledged $5 million to female filmmakers at USC's School of Cinematic Arts in a public statement apologizing for his actions. "In […]
TrojansAlert fails to inform students
By Daily Trojan Staff
January 21, 2016 in From the Editors, Opinion
At 5 p.m. on Tuesday, USC students received a TrojansAlert text message warning of police activity in the area, quickly assuring students there was "no threat to USC" and that the "area [was] safe." The Los Angeles Police Department activity, which the TrojansAlert did not expand on, involved a shooting in which a victim was […]
A word from the editors
February 10, 2014 in From the Editors, From the Editors, News, Opinion, Special Topics, Student Government, USG Election 2014
Voting — it is one of those tasks that all too often falls into the category of routine chores. Too often, voting seems no more important than taking the car in for an oil change, going to the dentist or picking up the dry cleaning. In the midst of hectic daily grind, it can seem […]
Thanksgiving and Notre Dame
November 22, 2012 in Blogs, From the Editors
The Daily Trojan staff would like to wish the USC community a Happy Thanksgiving. As part of the school-wide break, the DT's print production staff will be observing the November holiday until Monday, Nov. 26. The next print edition will hit newsstands Tuesday, Nov. 27. Until then, follow @dailytrojan on Twitter and like our Facebook […]
November 4, 2012 in Blogs, From the Editors
In an effort to keep the USC community up to date on a bevy of important issues and events, the Daily Trojan has produced a large amount of content both online and in print. Here's a rundown of (and some links to) what's been going on: Last Wednesday a Halloween shooting rattled the campus. The Daily […]
Endorsement: Yes on Prop 30
By cbmccull
November 1, 2012 9 Comments/in Blogs, Election 2012, From the Editors, Opinion, Special Topics
The debate between Propositions 30 and 38 is intensifying for California residents. Unfortunately, neither proposition is perfect. Prop. 30, Gov. Jerry Brown's measure, plans to increase taxes on the richest Californians to help close the budget gap, generating revenue for schools and local public safety programs. Prop. 38, lawyer Molly Munger's proposal, would raise the […]
A centennial celebration (and other DT announcements)
September 16, 2012 1 Comment/in Blogs, From the Editors
I'll address the small stuff first. The Daily Trojan's print production staff will be observing a brief hiatus because of the football Weekender. As is tradition, there will be no Monday paper, but check newsstands Tuesday for a full recap of Saturday's game against Stanford, a 21-14 upset, and the latest in campus news. If […]
September 3, 2012 in Blogs, From the Editors
The Daily Trojan's print production staff will be observing Labor Day. Because of the holiday there will be no newspaper printed for Tuesday. Check newsstands Wednesday for continuation of the print edition. For the time being, our online staff will continue to update the website and social media pages. The long weekend has proven to […]
Orientation Issue
August 19, 2012 in Blogs, From the Editors
Daily Trojan will be sharing content from this semester's Orientation Issue throughout the week. Divided into the DT's four regular sections — News, Opinion, Lifestyle and Sports — O Issue is a special edition released at the beginning of each academic year that highlights USC and Los Angeles for incoming freshmen and new transfer students. […]
Read other full issues >>
New DPS interim chief appointedJanuary 14, 2022 - 10:56 AM
Erroll Southers will oversee a nationwide search for permanent replacement.
Students "shocked" at now-reversed softlock on meal swipesJanuary 12, 2022 - 12:34 AM
The change, which USC Hospitality nullified in an email Jan. 10, restricted meal swipe use to time-constrained meal periods.
Remote courses kick offJanuary 12, 2022 - 12:00 AM
Students react to University decision to begin classes online with mixed feelings.
Rules for USC's return to campusJanuary 12, 2022 - 12:00 AM
Everything you need to know about the University's coronavirus guidelines.
Tweets by @dailytrojan
View older full issues...
News Tips >
View older full issues ➡️
© University of Southern California/Daily Trojan. All rights reserved.
Accept settingsDo Not Accept | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Following a photo shoot at the Eiffel Tower and touring of the iconic Notre Dame Cathedral players, parents and coaches had some unstructured free time to enjoy additional sight-seeing, cafe time and souvenir hunting. One group of players with parent escorts ventured off to an area adjacent to the famed-cathedral for a secret taping of the AFW ELITE version of Harlem Shake. Joined by some passerby French citizens, this version was a highly creative, fun and bonding moment of the tour that took place on the second full day of the tour. The team was 'coming together' and it was that unity that strengthened all week which helped forego a 19-0 victory over the national U19 team of France later in the week. | {
"redpajama_set_name": "RedPajamaC4"
} |
If you've been wanting a reason to jump back into Arkane Studios most recent game Prey you'll soon have one. Arkane and Bethesda have announced that owners of the Prey DLC, Mooncrash, will get access to a new multiplayer mode in a free update coming on December 11.
Typhon Hunter is the mode and is a tense game of hide and seek between one survivor and five other players who play as mimics and can hide in plain sight. It will also have VR support on both PC and PlayStation 4 where you can play Typhon Hunter or Transtar VR which is a new single player mode. You can read more details on the update below. | {
"redpajama_set_name": "RedPajamaC4"
} |
ORDER NOW FOR XMAS - DONT MISS OUT SELLING FAST!
This is a new addition to the fleet this new style Garden Windmill standing at nearly 8 feet (2300mm) tall it has a wind fan with a span of over 2.5 feet wide. With it's long kicked back blades to keep it full on to facing into the wind at all times.
Great for a pond or water feature. Must be secured to the ground with pegs.
This 8 foot garden windmill will definitely set the scene and give that authentic Australian country feel to any home or commercial outdoor garden area. We think that there is nothing more dramatic than a silhouette of a Australian Windmill across the sky at an evening sunset.
The 8 foot Garden Windmill is delivered in one box with a total weight of 15kg's.
An easy to assemble 5 piece kit means a 5 year old child can put together. | {
"redpajama_set_name": "RedPajamaC4"
} |
Kubernetes 1.14.0 ("Caturnetes") is now available! More info is available in the Kubernetes 1.14 Blog Post.
Head to the v1.14.0 GitHub Release page to find downloads, and be sure to read the changelog to take any necessary steps prior to upgrading. You'll also find .rpm and .deb files where you expect them to be.
I'd like to thank the Kubernetes 1.14 release team for all of their amazing work these past three months, and for tolerating my plethora of cat T-shirts. I'd also like to thank everyone who contributed these past three months and put up with all of the KEP puns. This was, as always, a community effort.
We ended up with more stable enhancements this release than any prior release of Kubernetes. Some of these represent years of continued work. That is no small feat. Take some time to celebrate.
Finally, we will be taking over this week's Kubernetes Community meeting for a retrospective on the release process. Please add any questions/comments/concerns you have to the 1.14 retro doc. | {
"redpajama_set_name": "RedPajamaC4"
} |
80s/90s News
Backstage Fights
Celebrity Rants
Dear Dr. Dave (Batista)
Mock My Brain
Leapin' Lanny's 'Pit Poems
Greatest Matches Ever
Road Stories
It Makes No F'n Sense
Royal Roasts
Stupid Things Said by Stupid Marks
Weekly Quiz
New Japan
All Japan
All Japan Women
What Culture
Womens Wrestling
Highspots
Kayfabe Commentaries
RF Video
Home » Backstage Fights » Jim Cornette vs Santino Marella
Jim Cornette vs Santino Marella
Written by The Wrestling Professor on July 30, 2016 in Backstage Fights
Source: Wrestling Observer Newsletter, NWA Fan Fest 2009
Jim Cornette is one of pro wrestling's all-time great characters, both on and off camera. His knowledge of pro wrestling history and writing television ranks up there with anyone, and he's very passionate about his vision of what pro wrestling should be. This passion is both a blessing and a curse, as it's led to numerous public tirades that often turn violent. This particular incident was an example of that, and it ended up costing him his job.
Santino Marella, real name Anthony Carelli, was a student at OVW (Ohio Valley Wrestling) who was paying to be trained by Danny Davis, long before he went to WWE and became Santino Marella. He had only been wrestling for two years, and had a background in judo and amateur wrestling as well, and claimed to have competed in six MMA fights before he got to OVW.
Before getting into the physical confrontation between the two, it's important to understand the background.
Cornette was part owner of OVW, and at the time, WWE had a working relationship with them where they'd send young prospects to Ohio to learn the ropes under the guidance of Cornette, Davis, and others. OVW was WWE's developmental territory before FCW (Florida Championship Wrestling) and NXT, but WWE never owned OVW. Cornette was a WWE employee who was sent there to be the booker and write the television and work with the talent, since he had a relationship with Davis from when he managed him in the '80s.
Prior to going to OVW, Cornette was on the WWF booking team in the mid to late '90s, and after too many blowups with Vince Russo, he was sent to OVW and was initially very happy there. Cornette was never a fan of living on the East Coast, and he absolutely hated to travel. In the early days of OVW, Cornette helped shape the development of John Cena, Batista, Randy Orton, Brock Lesnar, and others who went on to become stars in WWE.
But by 2005, the bloom was off the rose. The problems began when Jim Ross was replaced as Head of Talent Relations by John Laurinaitis. Ross and Cornette went way back to their days in Mid-South Wrestling when both worked for Bill Watts. The two have similar philosophies about wrestling and had a tremendous amount of respect for each other. When Cornette battled with the McMahons over disagreements on talent and who should be called up to the main roster from OVW, Ross always soothed things over and stuck up for Cornette. With Ross gone, that buffer was gone and Cornette started clashing with WWE management more and more.
Laurinaitis also had a history with Cornette, as he managed him in 1989 as part of the Dynamic Dudes act when Laurinaitis was Johnny Ace. But the two didn't have the relationship like Ross and Cornette did.
WWE was becoming more and more ridiculous and illogical with wrestlers they'd call up. They wanted guys on the main roster years before they were ready, like Chris Masters, Bobby Lashley, and Orlando Jordan, for example. This frustrated Cornette, and their erratic booking and talent decisions often wreaked havoc on Cornette's OVW storylines.
The stress led to outbursts and tantrums, which is similar to how he behaved when it looked like his regional Smoky Mountain Wrestling promotion wasn't going to make it towards the end. In 2005, he blew up at the Dudleys when he allowed them to come up with their own finish during a match in OVW, and they came up with the idea of powerbombing Jillian Hall through a table. Cornette was furious when it happened, as OVW was run in such a traditional way where a move like that would literally cripple a woman in real life, and he had plans for Hall and didn't want her now having to sell the powerbomb for weeks. The Dudleys were from the ECW mindset where such a move was commonplace, and in their world, Hall would be fine the next day. It was a misunderstanding, but Cornette threw a fit.
Cornette also exploded on Kevin Fertig, who worked as Mordecai in WWE. Fertig wore a baseball cap to the ring once, and Cornette told the ref to tell him to take it off, which he did. He then took a sombrero from a fan in the audience and wore it, which Cornette saw as a slap in the face. Cornette was finally going to be fired, but Ross saved the day.
Ross convinced Laurinaitis to give Cornette a paid vacation, which he took. While he was out, Tommy Dreamer took over the booking duties and did an absolutely horrible job. Paul Heyman was also spending more time in OVW, helping guys with interviews. Heyman and Cornette weren't friends, and Cornette had often bashed him in the press, but there were no problems between the two whenever Heyman was there.
Tom Pritchard, a longtime Cornette ally and former star in SMW, was fired from WWE during this time. His constant defense of Cornette and OVW did not do him any favors. All political forces were against Cornette.
When Cornette came back from vacation, WWE informed him they wanted Marty Wright to get some TV experience ASAP, as they wanted to debut him on SmackDown as the Boogeyman. Wright gained game on the 2004 version of Tough Enough, where he lied about his age and claimed to be 30, when in fact he was 40. He was nicknamed Marty "Liar" Wright, but with his outstanding physique and unique promo ability, he was rushed to the main roster. WWE ran vignettes about him before he even had his first pro wrestling match.
Boogeyman
Cornette's plan to get the Boogeyman gimmick over was to portray him not as a cartoon character, but as a scary, psychotic individual who was crazy in real life. At the TV taping, the plan was for him to come out from under the ring, cut a promo in the ring, walk around looking scary, and walk out the exit (as opposed to the backstage curtain). Cornette planted students from the OVW school near the exit and instructed them to run away looking frightened as the Boogeyman walked towards them.
What Cornette didn't know is that WWE had told Wright to wear antlers on his head. Whoever came up with that idea should've been fired. As Wright came out from under the ring, instead of looking menacing, he looked ridiculous. Cornette internally was going crazy because of the silly antlers, which made it hard to be taken seriously. He also wore a big necklace and carried a voodoo stick.
To Wright's credit, he had the ability to cut a realistic promo that made you actually want to take him seriously. It was his promos that made WWE want to rush him to the main roster, because few had the ability he did to come across so believable.
After the promo, he walked towards the exit as planned. And the students all acted scared and got out of his way, as planned.
Except one: Santino Marella.
Not only did he not look scared or run away, he also chuckled. It completely ruined the aura of Boogeyman's gimmick. The show aired live and it couldn't be edited out.
Cornette, off camera, was going nuts and waving his arms for Santino to move. He didn't. Cornette later admitted that he literally pooped his pants a little, that's how frantic he was. Boogeyman even shook the railing to send the hint that he needed to run away, but he still didn't.
After the Boogeyman left, Cornette, who doubled as the color commentator, left the announcer's desk. That was planned, because OVW character Kenny Bolin was coming out for an interview and Cornette was feuding with him in storyline, and so it would make no sense if he was there. In reality, Cornette was backstage and asked about Santino, "Is he one of ours?" referring to whether or not he was an OVW student. They nodded. "Send him to me," he said.
The Confrontation
Everyone in the room knew what was coming. Cornette was going to lay into him verbally like he's done many times in the past. And that's what he did. Santino replied, but Cornette didn't hear him. "What??" he asked. Santino repeated himself, saying no one had told him to run away from the Boogeyman. This only angered Cornette more, as he felt it was obvious based on what everyone else did, and also said she shouldn't have laughed.
Santino Marella
At this point the Boogeyman entered the room, as he had just walked in from outside, where he had just escaped to in the TV angle. He was steaming mad, as would be expected.
"Look at this mother*cker!" Cornette said, pointing to Wright. "He's wearing antlers, face paint, and everyone else is running!" is akin to what he told Santino. He reiterated to Cornette that no one told him to run.
"Oh yeah? Did anybody tell you I was gonna do THIS?" Cornette then delivered the slap heard 'round the world, which would later get him fired. Santino was surprised and acted like he was going to fight back, but also knew that if he did, his potential career would be over.
Cornette was telling him that if he wants to fight him, then fine, they'd go outside. But that if he was such a tough guy, this guy here (Wright) "Is gonna f*cking kill you." Cornette believes he saved Santino's life by slapping him instead of what Wright would have done to him.
What neither Cornette nor Wright knew was that Santino was a real shooter, and if he wanted to, he could've taken them both out. It wouldn't have been the first time, as just a couple months earlier, he had taken a few fans down in a parking lot brawl at an indie show.
Cornette then continued slapping him. Each set of slaps consisted of three mini-slaps: left, right, left. He kept going for anywhere from 10 to 20 slaps before he stopped, as students were surprised Santino sat there and took it given that he was considered one of the toughest guys there.
Since it was a live TV taping, Cornette had to go back and do the show.
Even though he took the slaps without retaliating, Santino was bothered by what happened. He informed WWE of what happened, and the next day, Cornette was fired. Not even his supporters could defend his actions. It was time for him to go.
Many saw it as a double standard, as WWE hadn't fired JBL or Bob Holly for doing far worse. In reality, all three should've been fired. Laurinaitis told Cornette his behavior couldn't be tolerated in a publicly traded company. While that is true, the reality is that his behavior shouldn't have been tolerated anywhere, in any company of any size. Cornette joked that OVW didn't even have enough money to be a privately traded company, but that is beside the point.
With Cornette gone, WWE eventually severed ties with OVW and started up their own developmental territory. It led to the eventual formation of NXT, which has since become WWE's exclusive training facility. Cornette later went on to book for ROH and also worked for TNA (ironically alongside his heated rival Vince Russo), and now appears at local fan conventions within driving distance. He also hosts a popular podcast called "The Jim Cornette Experience."
The Boogeyman ended up having a decent run in WWE, with a gimmick that he ate worms and made his opponents eat them too. He was later released.
The real irony is that Santino went on to become a pretty big star in WWE; far bigger than Wright ever was. He debuted on a WWE taping in Italy, where he got over instantly. He never became a top wrestler, but his comedic talents were such that he got a lot of TV time for his wacky promos, funny accent, and likable personality.
The OVW segment:
https://www.youtube.com/watch?v=-mZjwytve9s
Cornette's side of the story:
Join the ARMPIT ARMY
Sign up and get a FREE sample of our wrestling quiz e-book!
Never miss a single story. Exclusive commentary, news updates, and the latest happenings at The Armpit.
Comics & Memes
Free Wrestling Videos
Sex Advice (Dear Dr. Dave)
Copyright © 2017 The Armpit - Not intended for readers under the age of 18. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Bone Dry offers an unparalleled roofing experience. Our team members are some of the best in the industry, with years of experience and a dedication to creating lasting relationships with our clients.
The Master Elite certification is given only to the best of the best in the roofing industry. To become Master Elite, the contractor must meet the highest standards of licensing, insurance, reputation within the community, and commitment to ongoing professional training.
The intense certification process pushes contractors to their limits, ensuring that only the best in the country can call themselves Master Elite. While thousands apply, only 3% claim the title.
As a certified Master Elite roofing contractor, Bone Dry has set itself apart from the competition. Besides the distinction of certification, Master Elite status gives Bone Dry eligibility to give the best warranties in the industry.
Over the years, we've developed a six-step process to ensure that every project we undertake is delivered on schedule while meeting each customer's specific criteria.
Using this system, we forge personal relationships with each of our clients, allowing us to better understand their unique position so that we can create the perfect roof to suit their needs.
However, this process does not end after step six. Just as a roof needs continuous maintenance to remain effective, so do our relationships, which is why we begin the cycle anew after every project. This way, we ensure that we never stop fulfilling customer needs and exceeding their expectations, building each relationship until it's just as strong as the roof over their head. | {
"redpajama_set_name": "RedPajamaC4"
} |
Q: Using file functions to reverse the characters in the file So, using fseek and ftell function I am trying to print the characters one at a time by first pointing to the end of the file using fseek and then decrementing the value of ftell to print the last character and then print the previous ones.
#include <stdio.h>
#include <stdlib.h>
int main()
{
FILE *fp=NULL;
char i=0,count=0;
fp= fopen("note.txt","r");
if(fp==NULL){ printf("File error");
return -1;}
fseek(fp,0,SEEK_END);
count=ftell(fp);
while(count){
count--;
fseek(fp,count,SEEK_END);
i=fgetc(fp);
printf("%c",i);
}
fclose(fp);
fp=NULL;
return 0;
}
My code is printing some strange characters so it isn't working, any suggestion on where I am going wrong in the while loop?
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
Time for my sixth annual wildflower hike on Tronsen Ridge. Check the site for mid June to early July each year to see the other reports. Kim, Jonathan, and Gwen signed on for this trip. The Five Mile Road to the trailhead is narrow, brushy in spots with a few tough trenches and no turnaround spots the upper two miles. With my Subaru clutch misbehaving, Gwen's Subaru balking, and Kim's truck too small that left Jonathan's Subaru Outback as the vehicle of choice. The only report this year had the folks parking two miles from the top and walking. They reported a lot of paint scraping brush and nothing else about the bad spots. We chose to park and walk too. One SUV passed us as we were getting ready. Of course it began to rain. The day before there were torrential down pours all over. Another reason we were reluctant to drive to the top. With rain gear on and umbrella's deployed another big SUV came up. Hey, it was Joe! He and Barb graciously agreed to add all four of us and our gear. His vehicle had no problem with the road. The problem was the first guy to pass us who decided to head down. Joe had to back up quite a ways downhill on a very narrow road. I'm glad I was not driving.
The worst trenches and low spots were filled with water from the recent deluge. A Subaru would have made it though it was not at all clear since the depth of the "lakes" was not apparent. Thanks to our good luck we were at the trailhead and ready to go by 10:20 am. The rain was light as we headed up the trail. The flower show always starts right away and never really lets up. The key to this hike is variety. Wet west of the crest flowers and dry desert flowers all in one place. Usually something new around the next corner. This was the first visit for Gwen and Barb. After the heavy rain on Tiger Mountain the day before Kim and I figured it could only be better. Rain much of the drive over Snoqualmie and Blewett Passes but not heavy.
The flower show near the start was good though less Indian Paintbrush than usual was in bloom. Lots of lupine there and most everywhere all day. I missed the white lupine but did see several bunches of the pink variety farther along. As usual, there were many wildflowers I recognized but could not recall by name. Between all of us we did name most of them. The rain and clouds really made the colors deep. Especially all the long grasses. We ran into a group almost immediately. They had been drenched and were heading down. I Jonathan knew several of them and I recognized Ron Sheets. It had been about 15 years since I hiked with him on a Mountaineer scramble. Time flies. The grade is fairly gentle with a few short steep sections. It's a ridge so there are ups and downs meaning elevation gain on the way back.
The balsamroot was nearly finished. Only higher up near our turnaround spot did we see some nearly peaking balsamroot. Lots of bright yellow color just shriveling petals. What Indian paintbrush there were were really bright red. Great color. As usual our pace was glacial as photo stops were mandatory. The very hard rain the day before pounded some of the more delicate flowers. The Tweedy's lewisia being hit the hardest. Those big leaves really caught the falling rain. Most Tweedy's were blooming though at or just past their peak. Not as thick as some years but a good crop none the less.
The rain soon stopped and before long the rain jackets and pants began to be shed. We had some partial blue sky later but no more rain all day. We recalled the spots to find favorites like old man's whiskers and Columbia clematis. Lots of those in bloom. We saw only two groups of recreational motorcyclists and two forest service motorcyclists. We did not see any other hikers all day. At about two miles we stopped for food and to enjoy a multitude of wildflowers. A spot just off the main trail had lots of scarlet gilia in bloom. One big patch of Columbia lewisia was also blooming. That is the only place on the whole route I've seen the Columbia lewisia.
The clouds were low and the sky gray but the dryness was appreciated. The peaks of the Teanaway area were visible here but the Stuart Range was mostly in the clouds. From here the trail traverses an open slope with a number of desert flowers. The locoweed pods were plentiful and colorful. There were many bitterroot flower buds but only a handful were open. That was a disappointment. Near the Red Hill trail junction were the usual plethora of Tweedy's. Plenty but not as many as last year in bloom. We took the short climb to the rocky point for the rest of our lunch. Some pink and pure white Tweedy's up there. Not much of a view though it was clearer to the east.
Joe and Barb bypassed the point and continued hiking ahead. Gwen and I chose to also hike farther down the trail. Kim and Jonathan chose a more leisurely return with more photo time. We soon passed Joe and Bark as they were heading back. We set a good pace and hoped to reach the lichen wall in the time we had. Lots more flowers on the open slopes. Some we had not seen so far. The trail reaches the ridge once again. and drops down into forest. More variety all along here. More paintbrush, lupine, clematis, gilia, Tweedy's, and balsamroot to name a few. We continued for 1 1/4 miles to the green and orange lichen wall and a little beyond. Gwen noticed two wire insulators along here. I don't know of any fire lookout on Tronsen Ridge so I have no idea why they were there. A few switchbacks took us to the top of the lichen wall. The trail switchbacks right but since this would be our turn around point we went left and explored. A boot path goes right along the top of the wall. The drop is vertical and even overhanging in one spot. Great views back to the trail we had hiked.
We sped back and met Kim and Jonathan at the bitterroot spot. A few more had opened up since we passed earlier. Joe and Barb texted that they were at the cars. Did we want a ride back down. We said we were an hour away and not to wait. There were far fewer photo stops on the return though the sky was most interesting. Some near black sky next to bright blue. Great contrast. We even had some puffy white clouds now. Good to our word we took 59 minutes to reach the trailhead Much to our surprise Joe and Barb where still there. Thank you very much for deciding to wait. One of the "lakes" on the road down had no place to get around on either side. It was much deeper than my boots are tall. I did not miss avoiding that.
We stopped at the Cottage Cafe in Cle Elum for dinner and I still made it home by 8:30 pm, well before dark. As usual this was the best wildflower hike of the season, at least so far. The company was first rate too. Just because the forecast was for showers and it rained most of the drive over that was no reason to give up on a great hike. I'll probably be back next year. | {
"redpajama_set_name": "RedPajamaC4"
} |
Actress Vidya Balan has announced her film 'Begum Jaan' will release on April 14.
The 38-year-old star took to Twitter to share the first poster of the film. "14th April it is," wrote Vidya, alongside the image.
The film is the Hindi adaptation of Bengali movie 'Rajkahini', helmed by acclaimed filmmaker Srijit Mukherji, which also marks his directorial debut in Bollywood.
The story revolves around the madam of a brothel essayed by Balan.
the National-winning actress in the film.
The film also stars Naseeruddin Shah and Gauahar Khan in key roles.
Saif Ali Khan starrer 'Kaalakaandi' official trailer is out! | {
"redpajama_set_name": "RedPajamaC4"
} |
Welcome to the audio of our conference about building a "business in a box" This event was held back in 2012, and lays-out a strategy that any up-and-coming faceter can use to target the rough they purchase, the designs they cut, their approach to working with jewelers – and an incredibly easy and fast-to-start way of building a retail clientele – without the overhead of a storefront of any kind.
Some of this material overlaps with the Opening the Door with Jewelers video. I recommend you view that one while this conference is fresh in your mind. I hope you implement the stuff from this event! | {
"redpajama_set_name": "RedPajamaC4"
} |
Q: Does a power ring (Green Lantern's ring) automatically transport a new wielder to Oa? Have there been canon times when the ring simply goes to the new wielder and brings them the power battery, but does not transport them to Oa once charged?
A: Since you mentioned the extended universe, and not just comics, just as an example, the DC Animated film First Flight. Hal Jordan gets the ring and is exploring his new powers and abilities around Earth when Sinestro, Kilowog, and some other Lanterns show up to take him to Oa to explain what's going on and what being a Green Lantern means.
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
Head of Xbox Phil Spencer Has a 'Desire to Keep Call of Duty on PlayStation'
by William D'Angelo, posted January 20th
Phil Spencer Wants to Work on a Variety of Franchises from the Activision Blizzard Vault
Activision Blizzard CEO Wants Xbox to Develop a New Guitar Hero and Skylanders
Sony Expects 'Microsoft Will Abide by Contractual Agreements and Ensure Activision Games are Multiplatform'
Sony 'Unlikely' to Drastically Increase PS5 Supplies, Aiming to Beat PS4's 14.8M Shipped in 2nd FY - News
by William D'Angelo , posted on 03 July 2021 / 1,758 Views
Sony Interactive Entertainment earlier today announced it has shipped 7.8 million PlayStation 5 consoles as of March 31, 2021. This puts it 200,000 units ahead of the Playstation 4, which had shipped 7.6 million units as of March 31, 2014.
Sony CFO Hiroki Totoki in a call to investors said it is unlikely they will be able to drastically increase the supply of the PlayStation 5.
Sony is aiming to ship more PlayStation 5 consoles in its second fiscal year, which ends March 31, 2022, than it did PlayStation 4 consoles in its second fiscal year. For reference, the PlayStation 4 shipped 14.8 million units from April 2014 to March 2015.
"As I said earlier, we're aiming for more sales volume than the PS4 [during year 2]," said Totoki. "But can we drastically increase the supply? No, that's not likely.
"The shortage of semiconductors is one factor, but there are other factors that will impact on the production volume. So, at present, we'd like to aim at [beating] second year sales of 14.8 million, which was the second year of PS4."
Thanks, VideoGamesChronicle.
A life-long and avid gamer, William D'Angelo was first introduced to VGChartz in 2007. After years of supporting the site, he was brought on in 2010 as a junior analyst, working his way up to lead analyst in 2012. He has expanded his involvement in the gaming community by producing content on his own YouTube channel and Twitch channel dedicated to gaming Let's Plays and tutorials. You can contact the author at [email protected] or on Twitter @TrunksWD.
Sort by Highest Rated
DonFerrari (on 28 April 2021)
Well at this point in time there were no more shortages for PS4, so let's see if they only beating PS4 in production by a small margin can make the console available in stores in the next 6 months.
gtotheunit91 (on 28 April 2021)
Dang, I wonder what kinds of sale numbers would be happening if there wasn't the semiconductor shortage. PS5 would probably be at 10 million consoles sold by now. No way to know Xbox's sales, which Microsoft doesn't even care about, but those consoles would be doing exponentially well too.
KratosLives (on 28 April 2021)
I heard australia is getting a big shipment this week, hopefully my preorder arrives.
AFattyGamer (on 28 April 2021)
PS5 will surpass the mantle the PS4 left behind. Conservative expectations as always Totoki-san.
TallSilhouette (on 28 April 2021)
Damn you, Rona! You crossed the line!
PS5 vs Xbox Series X|S vs Switch Launch Sales Comparison Through Week 60
PS5 Sales Top 18 Million - Worldwide Hardware Estimates for Jan 2-8
Activision Blizzard Studios and IPs to be Owned by Microsoft
Microsoft Acquires Activision Blizzard for $68.7 Billion
Switch Best-Selling Console in the US in December, Xbox Series X|S Outsells PS5
Phil Spencer Reacts to Rumor of PlayStation Working on Rival to Game Pass
Sony Stock Prices Drop Following Microsoft Acquisition of Activision Blizzard
Phil Spencer: It's Not Our Intent to Pull Communities Away From PlayStation
Best VR Game of 2021
God of War (2018) for PC Hits New Steam Record for a PlayStation Studios Title | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
November 3, 2017: Moral Imagination in Chronic Illness presented by Marina Tsaplina. 12:00pm – 1:00pm. More information here.
November 4, 2017: Diabetes Fair at Penn State Milton S. Hershey Medical Center. 9:00am – Noon. More information here.
November 5, 2017: Harrisburg One Walk. Register or donate here!
November 8, 2017: Strawberry Square FamilyCare Diabetes nutrition information. More information here.
November 11, 2017: LGH Diabetes Day. 10:00am-12:00pm. Click here for more information!
November 14, 2017: World Diabetes Day – diabetes and nutrition information. More information here.
November 17, 2017: The Extraordinary Give. Donations will be accepted at this site from 12 midnight – 11:59 PM as part of Lancaster County's largest day of online giving. On that day, every dollar donated will be stretched by at least $500,000 from the Lancaster County Community Foundation,our Presenting Sponsors Rodgers & Associates and the S. Dale High Family Foundation, plus our generous community partners, to support JDRF. CLICK HERE to donate.
November 20, 2017: Strawberry Square FamilyCare total cholesterol, glucose, and blood pressure screenings. More information here.
November 28, 2017: Susquehanna Harvest Dine to Donate Night for JDRF. 11:00am-10:00pm. With presentation of flyer (will be added) and 10% of your purchase will benefit JDRF. | {
"redpajama_set_name": "RedPajamaC4"
} |
'Crisis decision making at the speed of COVID-19' - Bay Area public health officials share their experience with shelter-in-place order
Wolters Kluwer Health
November 24, 2020 - In mid-March, public health officials across the San Francisco area issued the first U.S. regional shelter-in-place order in response to the emerging COVID-19 pandemic. A "field report" on the crisis decision-making approach followed in that effective early response is featured in a special COVID-19 supplement to the Journal of Public Health Management and Practice. The journal is published in the Lippincott portfolio by Wolters Kluwer.
"With the benefit of hindsight and reflection, we recount our story through the lens of public health legal authority, meta-leadership, and decision intelligence," according to the new article, authored by Tomás J. Aragón, MD, DrPH, of the San Francisco Department of Public Health along with local health officers (LHOs) from six other Bay Area jurisdictions. Their paper appears as part of a JPHMP supplement titled "COVID-19 and Public Health: Looking Back, Moving Forward."
On March 15, 2020, LHOs in Alameda, Contra Costa, Marin, San Francisco, San Mateo, and Santa Clara Counties and the City of Berkeley issued legal orders for 6.7 million residents to shelter-in-place to prevent the spread of SARS-CoV-2. Within days, other regions issued similar orders. Studies have confirmed that early shelter-in-place orders prevented many COVID-19 cases, hospitalizations, and deaths across the United States.
But even in a crisis, outcomes can't determine whether a decision was good or bad. "The quality of a decision depends only on the quality of the decision-making process at the time the decision was made," Dr. Aragón and coauthors write. They review key elements of good crisis decision making during complex public health emergencies:
Crisis Decision Making. Public health decision makers bring epidemiologic (causal and probabilistic) reasoning and the ability to balance tradeoffs from competing objectives to tackle a health crisis. In the face of "volatility, uncertainty, complexity, and ambiguity," team deliberations must be built on trust-based, collaborative relationships and approached with "genuine intellectual humility ... embrac[ing] curiosity over certainty."
Legal Authority. In California, LHOs are authorized to take measures as necessary to control the spread of communicable diseases. This enabled the Bay Area LHOs to act "quickly and decisively" to issue shelter-in-place orders to protect the public health and healthcare system from a COVID-19 surge like that occurring at the time in New York City.
Meta-Leadership. Longstanding state and regional health official networks have played an important role in responding, adapting, and scaling to public health threats. In the Bay Area, years of experience in preparing for pandemic influenza, and responding to other microbial threats, enabled the spontaneous activation of "swarm leadership"--a key characteristic of good disaster responses where a group, without formal hierarchical authority, coalesces to tackle effectively a complex emergency.
Decision Intelligence. Dr. Aragón and colleagues define decision intelligence as "the integration of problem-solving and decision quality within a performance improvement framework, ensuring quality and continuous improvement in crisis decision making." While recognizing that a shelter-in-place order was a "drastic measure," the LHOs agreed that immediate action would maximize the benefits of interrupting transmission: "flattening the curve" of COVID-19 cases, hospitalizations, and deaths while providing time to ensure public health systems readiness and to learn about SARS-CoV-2 biology and transmission.
The Bay Area LHOs hope their experience will draw attention to the elements of crisis decision making - throughout the pandemic and in preparing for future public health emergencies. "Decision intelligence provides practical tools to improve crisis decision making," Dr. Aragon and coauthors conclude. "We hope that with experimentation and practice, public health officials will improve their routine team decisions, and thereby be capable and ready to make better decisions in new crisis situations."
The supplement presents 18 original research papers and commentaries, focusing on the early phases of the public health response to COVID-19. In an introduction, guest editors Chrissie Juliano, MPP; Michael Fraser, PhD, CAE; and Brian C. Castrucci, DrPH, MA; write: "The knowledge shared in this supplement can be instantly applied to the current public health response to COVID-19 and to help protect the health of all Americans."
The supplement is sponsored by the de Beaumont Foundation, the Association of State and Territorial Health Officials, and the Big Cities Health Coalition.
Click here to read "Crisis Decision-Making at the Speed of COVID-19: Field Report on Issuing the First Regional Shelter-in-Place Orders in the United States."
DOI: 10.1097/PHH.0000000000001292
About Journal of Public Health Management and Practice
Journal of Public Health Management and Practice publishes articles which focus on evidence-based public health practice and research. The journal is a bi-monthly peer-reviewed publication guided by a multidisciplinary editorial board of administrators, practitioners, and scientists. Journal of Public Health Management and Practice publishes in a wide range of population health topics including research to practice; emergency preparedness; bioterrorism; infectious disease surveillance; environmental health; community health assessment; chronic disease prevention and health promotion; and academic-practice linkages.
About Wolters Kluwer
Wolters Kluwer (WKL) is a global leader in professional information, software solutions, and services for the clinicians, nurses, accountants, lawyers, and tax, finance, audit, risk, compliance, and regulatory sectors. We help our customers make critical decisions every day by providing expert solutions that combine deep domain knowledge with advanced technology and services.
Wolters Kluwer reported 2019 annual revenues of €4.6 billion. The group serves customers in over 180 countries, maintains operations in over 40 countries, and employs approximately 19,000 people worldwide. The company is headquartered in Alphen aan den Rijn, the Netherlands.
Wolters Kluwer provides trusted clinical technology and evidence-based solutions that engage clinicians, patients, researchers and students with advanced clinical decision support, learning and research and clinical intelligence. For more information about our solutions, visit https://www.wolterskluwer.com/en/health and follow us on LinkedIn and Twitter @WKHealth.
For more information, visit http://www.wolterskluwer.com, follow us on Twitter, Facebook, LinkedIn, and YouTube.
Connie Hughes
[email protected]
@WKHealth
http://www.lww.com
Journal of Public Health Management and Practice | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Medical marijuana to be grown in Northwest Arkansas
by: Kelly O'Neill
NORTHWEST ARKANSAS, Ark. (KNWA) — Medical marijuana dispensaries in Northwest Arkansas could soon be growing plants on site.
According to Scott Hardin, Medical Marijuana Commission Spokesperson, 23 of the 32 licensed dispensaries in the state will be able to grow the product.
That includes all four licensed dispensaries in Northwest Arkansas.
The Source in Bentonville says it will submit plans to the city next week, and if approved it will likely have product available by the end of summer.
Eric Ludwick with Acanza Health Group in Fayetteville says it's also on track to grow, and it could impact the price of the product.
"It's just supply and demand. When there's more product available, more strains available, we will be able to showcase that for the patients to see something a little different from what they've seen these past few months. When there's more on hand it will drop in price eventually," he said.
Ludwick says pending inspection, it could be growing in the next few months.
Once cultivation begins, there will be 24-hour security at Acanza.
Before a dispensary begins the growing process, green rooms are inspected and signed off on.
Up to 50 marijuana plants can be grown on-site.
A phone call to the Releaf Center was not immediately returned.
Purspirit Cannabis Co. in Fayetteville says it has plans to grow, but it will take years to build a larger facility. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
4374 Troost is a charming residential building located in the Colfax Meadows region in Studio City, California. Built in 2011, the 4374 Troost complex is comprised of just 6 luxury condos and penthouses. This community offers 2-bedroom floor plans ranging in size from 1,530 to 1,880 sq. ft., featuring Caesarstone counters, spacious living areas, hardwood floors, designer touches, walk-in closets, and soaring ceilings. Residents are drawn to 4374 Troost due to a combination of its wonderful amenities, quiet neighborhood, and short distance to shopping along Ventura Boulevard and the Carpenter School. This community offers secured parking, a private rooftop deck, and controlled access security.
Would you like to be notified when a new condo is listed in 4374 Troost?
There are currently no available properties for sale at 4374 Troost. If you would like to be alerted via email when the next listing comes up for sale, simply fill in your contact information. With inventory being at historic lows across Studio City, this is a great way to ensure you remain a step ahead of other buyers looking to buy in this same complex.
Whether you are contemplating purchasing or selling your condo in 4374 Troost, it is imperative that you hire the right Studio City Real Estate Expert that can exceed all of your expectations. When you work with The Ryan Case Team, your every need will be met with the greatest attention to detail. We are intimately familiar with 4374 Troost, and you will not find a more qualified Studio City Real Estate Agent to help you achieve your goals.
As a seller of a Condo or Townhome in 4374 Troost, your unit will be front and center on our top ranked website. This gives you maximum exposure above what a normal Studio City Realtor would provide, as our highly trafficked website will help us to sell your property in less time, at the highest possible net to you! After all, the same way you found us is how your next buyer will! | {
"redpajama_set_name": "RedPajamaC4"
} |
Directions : West Directions Coming from the West, use U.S. Hwy 83 East (Expressway 83 East) to Mission. Exit Bentsen Palm Drive. Proceed South on Bentsen Palm Drive for approximately 3 miles. Follow Bentsen Palm Development signage to our communities.
Submit a Review! Have you ever stayed at Bentsen Palm Village RV Park in Mission, TX ? | {
"redpajama_set_name": "RedPajamaC4"
} |
Q: How do you check if the characters in a string are grouped together? I want to be able to check if the characters in a string are grouped together.
The definition of being grouped: Not repeated somewhere else other than its cluster. In "AABBBBACDDD" it is not grouped since the last "A" is not in its cluster (first set of A's).
The characters do not have to be in alphabetical order.
For example:
AAABBBBBCCC → is grouped
AABBBBACDDD → is not grouped
There is definitely a loop involved but I don't know the conditions to check if it is group or not
A: This sounds like an algorithms question more than C++. So the algorithm is going to be like this, (pseudo-code). You can write C++ code for this (I can help you if you want):
function is_grouped(str):
seen_letters = {} # set of seen letters so far
last_letter = None
for c in str:
if last_letter == c: # if it is the same letter as before continue
continue
if last_letter != c && c in seen_letters: # seen before and a new cluster
return false
seen_letters.add(c) # new unsee cluster
last_letter = c
return true
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
US20050149538A1 - Systems and methods for creating and publishing relational data bases - Google Patents
Systems and methods for creating and publishing relational data bases Download PDF
Sadanand Singh
Richard Belew
Brian Bartell
Marie Linvill
Samir Singh
Belew Richard K.
Bartell Brian T.
Linvill Marie M.
Singh Samir S.
Rhodes James S.
2004-11-19 Application filed by Sadanand Singh, Belew Richard K., Bartell Brian T., Linvill Marie M., Singh Samir S., Rhodes James S. filed Critical Sadanand Singh
2004-11-19 Priority to US10/994,189 priority patent/US20050149538A1/en
Status Abandoned legal-status Critical Current
239000002585 bases Substances 0.000 title description 10
238000010606 normalization Methods 0.000 claims description 66
230000000875 corresponding Effects 0.000 claims description 21
281999990011 institutions and organizations companies 0.000 abstract description 112
238000007790 scraping Methods 0.000 description 27
238000006243 chemical reactions Methods 0.000 description 26
230000002776 aggregation Effects 0.000 description 22
238000004220 aggregation Methods 0.000 description 21
238000010586 diagrams Methods 0.000 description 18
238000000605 extraction Methods 0.000 description 17
239000000284 extracts Substances 0.000 description 15
281999990579 National Library of Medicine (U.S.) companies 0.000 description 12
238000001914 filtration Methods 0.000 description 9
281000001391 Parent company companies 0.000 description 7
230000004044 response Effects 0.000 description 6
238000000275 quality assurance Methods 0.000 description 5
201000011510 cancer Diseases 0.000 description 4
201000008790 communication diseases Diseases 0.000 description 4
239000003814 drugs Substances 0.000 description 4
241000212893 Chelon labrosus Species 0.000 description 2
241001117813 Datiscaceae Species 0.000 description 2
230000001808 coupling Effects 0.000 description 2
210000004369 Blood Anatomy 0.000 description 1
210000001787 Dendrites Anatomy 0.000 description 1
281999990625 Government companies 0.000 description 1
281999990642 Government Agencies companies 0.000 description 1
102000002067 Protein Subunits Human genes 0.000 description 1
108010001267 Protein Subunits Proteins 0.000 description 1
210000002356 Skeleton Anatomy 0.000 description 1
281000001334 Subsidiary companies 0.000 description 1
280000871617 Vault companies 0.000 description 1
230000004931 aggregating Effects 0.000 description 1
239000003570 air Substances 0.000 description 1
239000008280 blood Substances 0.000 description 1
230000001351 cycling Effects 0.000 description 1
238000003306 harvesting Methods 0.000 description 1
230000001939 inductive effects Effects 0.000 description 1
230000001404 mediated Effects 0.000 description 1
238000005065 mining Methods 0.000 description 1
230000001264 neutralization Effects 0.000 description 1
230000026676 system process Effects 0.000 description 1
230000001960 triggered Effects 0.000 description 1
G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
G06F16/90—Details of database functions independent of the retrieved data types
G06F16/95—Retrieval from the web
G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
G06F16/972—Access to data in other repository systems, e.g. legacy data or dynamic Web page generation
A searchable electronic database system that can return search results independent of reference source type. The electronic database system includes information that can be content or discipline specific. The database can be focused to allow research to be limited to the discipline specific universe of information. The database can include person, organization, publication, and other entity types. The publications can include journal articles, books, dissertations, grants, clinical trials, and web resources. The database can also include ontology and lexicon entities. The entities are interconnected through relationships. Searches performed on the database return results across all entity types. A single search can return results from each of the different publication types. Details of the results can be displayed. Dynamic links to one or more fields in a particular result detail can link to a result categorized according to the field.
This application claims the benefit of U.S. Provisional Application No. 60/524,116 filed Mar. 20, 2003 which is hereby incorporated by reference.
1. Field of the Invention
The invention relates to the field of electronic databases. More particularly, the invention relates to a searchable, navigatable, or publishable database that produces results that can allow for discipline-specific searching which can be transparent to a type of reference source and can allow for navigation to, from, or between database elements.
Researchers often access various electronic databases to search for and uncover information related to a particular subject of interest. However, results that are obtained from standard database searches are often simultaneously over inclusive and under inclusive. The results are over inclusive because they combine results across every discipline, and may return many search results that are completely unrelated or only tangentially related to the subject of interest. For example, a search on the term "induction" may return results relating to mathematics, electronics, electric motors, engine air intake, and other categories. Additionally, the search results may not access the most relevant information sources. For example, a search of an Internet web resource database may not sufficiently search journal articles. Additionally, a search of a journal article database will likely not reveal any results identifying book or dissertation sources. Thus, a researcher must perform the same search in many databases in order to reveal results from a variety of information sources. Additionally, the researcher must constantly manually filter the results to eliminate unfocused search results.
Manual filtering of search results by a researcher and duplicate searching of multiple source databases greatly reduces the effectiveness of a search. Filtering unfocused search results is a constant drain on researcher productivity. Additionally, the need to duplicate a search across numerous databases greatly diminishes the ability to cross reference and further analyze the search results.
Moreover, because the choice of search terms can greatly affect the quality of the results obtained, a researcher that is unfamiliar with key terms or vocabulary associated with a particular field may fail to uncover the most relevant information in a database.
A researcher needs a focused electronic database that eliminates unfocused information while allowing research across a variety of information source types. Searches of the database should provide focused search results. In addition to searching across various information source types, the search should compensate for unfamiliarity with the vocabulary or key terms used in a particular discipline.
Further, research often can be focused or expanded based on information by or about specific people or institutions, such as other researchers or research institutions. As such, the ability to reliably associate information, documents, or information from associated documents with specific people or institutions can be valuable.
Reliance on individuals or institutions to self-describe themselves, their interests, their work, or other information about them can result in inconsistent information with incomplete coverage. Alternatively, reliance on unconfirmed "clusters" of documents without the benefit of a definitive basis for comparison can result in error-full and inconsistent aggregations of information. What is needed is a reliable and scalable means for associating information, documents, or information from documents with people, institutions, or other entities or managing representations of such people, institutions, or other entities in such a way that direct submission and self description is optional rather than mandatory. Further, a system for making these representations available for keyword search, logical navigation, or other useful access is needed.
An electronic database system and methods that can return discipline-specific search results independent of reference source type and that can create such a database system are disclosed. The electronic database system can include information that is content or discipline specific. The database can be focused to allow research to be limited to the discipline specific universe of information. The database can include person, organization, and/or publication entities. The publications can include journal articles, books, dissertations, grants, clinical trials, and/or web resources. The database can also include ontology and/or lexicon entities. The entities can be interconnected through relationships. The relationships can include a belief rating based on specific evidence. Searches performed on the database can return results across any or all entity types. A single search can return results from each of the different publication types. Details of the results can be displayed. Dynamic links to one or more fields in a particular result detail can link to a result categorized according to the field. The dynamically linked results can be produced during the initial search or can be produced from the relationships to one or more entities identified in the fields of the dynamic links.
The features, objectives, and advantages of the invention will become apparent from the detailed description set forth below when taken in conjunction with the drawings, wherein like parts are identified with like reference numerals throughout.
FIG. 1 is a functional block diagram of a discipline specific electronic database system.
FIGS. 2A-2B are data models of electronic databases.
FIG. 3 is a database entity schema.
FIG. 4 is a data model of an electronic database system.
FIG. 5 is a database relationship schema.
FIG. 6 is a data import management schema.
FIG. 6 is a functional block diagram of a source import system.
FIG. 7 is a functional block diagram of a reference import system
FIG. 8 is a database schema for book import.
FIG. 9 is a flowchart of a book import process.
FIG. 10 is a flowchart of a journal article import process.
FIG. 11 is a flowchart of an organization input process.
FIG. 12 is a flowchart of a web resource input process.
FIG. 13 is a flowchart of a person input process
FIGS. 14A-14B are functional block diagrams of normalization modules.
FIG. 15 is a flowchart of a search process.
FIG. 18 is a functional block diagram of a database system.
FIG. 19 is an embodiment of a search input interface.
FIG. 20 is an embodiment of a search results interface.
FIG. 21 is an embodiment of a book expansion interface.
FIG. 22 is an embodiment of a person result interface.
FIG. 23 is an embodiment of a person expansion interface.
FIG. 24 is an embodiment of an article result interface.
FIG. 25 is an embodiment of an article expansion interface.
FIG. 26 is an embodiment of a dissertation result interface.
FIG. 27 is an embodiment of a dissertation expansion interface.
FIG. 28 is an embodiment of a save folder interface.
FIG. 29 is a functional block diagram of shared results system.
FIG. 30 is a flowchart of a result sharing process.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
An electronic reference database system and methods are disclosed. An example of the system and methods is described wherein the electronic database may be searched to provide research environment-specific results. The electronic database can be segregated to information specific to a single domain of discourse, community of information, family, or classification. The specific data classification or domain of discourse may include a specific profession or topic. A specific profession may include, but is not limited to, the medical profession. A specific topic may include subareas or specialties within that profession. For example, within the medical profession, an electronic database may be limited to such topics as neurology, communicative disorders, or blood and marrow transplantations. The database system may be segregated in other ways. For example the database may contain information specific to a single entity, such as a university, a system of entities, such as a university system, geographical area, such as a country, or other meaningful grouping. Information stored in the electronic database may be received from various sources. The information stored in the electronic database can describe or pertain to various types of entities, including persons, publications, and/or organizations. The electronic database may be searched by entering a search query. The results of the search query can include various source types and the results are not limited to any one source type. For example, the results of the search may include a list of persons, a list of publications, or a list of organizations related to the search. The electronic database can be internally navigated by dynamic linkages between entities. For example linkages may be followed among representations of a university, schools within that university, departments within those schools, people associated with those departments, and documents authored by or about those people or their work. The electronic database can support linkages and navigation between it and external information sources or databases. For example, navigation may be supported between a person represented in the electronic database and document they authored that is represented in an external database.
FIG. 1 is a functional block diagram of a discipline-specific electronic database system 10. As will be described below, the overall system can include a collection of such systems or particular subsets of such systems. The electronic database system 10 includes inputs from a variety of raw sources aggregated by a content aggregation management and staging module 20. The content aggregation management and staging module 20 retrieves discipline specific information from the various raw sources and imports it to a database 50. The output of the content aggregation management and staging module 20 is linked to a staging server 30.
The various modules described in FIG. 1 and other functional block diagrams can be performed by one or more computers, processors, or hardware executing software that is stored in one or more readable storage devices. For example, the content aggregation management and staging module 20 can be implemented as software stored in one or more storage devices performed by one or more computers.
The staging server 30 can be accessed by a staging client 62. The staging client 62 facilitates validation and verification of the data stored in the electronic database 50. The staging server 30 and electronic database 50 can in turn be coupled to a public server 40. One or more public clients 64 can access the public server 40 and can access, search, and navigate the results of the electronic database 50.
The raw sources 12, 14, 16, and 18 provided to the electronic database system 10 can be filtered to obtain discipline-specific sources and to ensure high correlations between information content across raw sources, for example to facilitate normalization between imported entities. The raw sources 12, 14, 16, and 18 can include, for example, sources relating to any of the source types such as organizational data, textual data, or person data. In one embodiment, the raw sources 12, 14, 16, and 18 are filtered to obtain information relating to the medical profession. In one embodiment, the information from raw sources 12, 14, 16, and 18 can be filtered to obtain information relating to communicative disorders within the medical profession. The raw sources can include, for example, sources from the National Library of Medicine (NLM) 12, archives from sources such as the UMI Microform and Digital Vault 14, publishers 16, as well as Internet websites 18. The content aggregation management and staging module 20 can filter the information from the raw sources 12, 14, 16, and 18.
Alternatively, a filtering module (not shown) or experts, advisors, or authorities in the identified discipline or subject area may filter the raw sources 12, 14, 16, and 18. For example, a small group of advisors may be commissioned to function as an editorial board with an editor in chief. The advisors may identify additional advisors, experts, or authorities that assist in reviewing and filtering raw sources prior to input in to the discipline specific electronic database 50.
In an alternate embodiment, filtering of raw sources can be implemented on an institution-specific rather than discipline-specific basis.
The information from the raw sources 12, 14, 16, and 18 can be provided in digital format or may be converted into a digital format in the content aggregation management and staging module 20. For example, the content aggregation management and staging module 20 may include a scanner and optical character recognition module (not shown).
The content aggregation management and staging module 20 collects the information from the raw sources 12, 14, 16, and 18 and aggregates the material into the various tables of the electronic database 50. Each of the tables can include attributes describing entities directly included or implied by the information from the raw sources. The attributes can provide properties or characteristics of the entity records. The various entities and attributes are stored in the electronic database 50.
The content aggregation management and staging module 20 is coupled to a staging server 30, which is also connected to the electronic database 50. The staging server 30 can perform content validation and quality assurance of the database information 30. The staging server 30 can perform content validation and quality assurance independently or as part of a quality assurance system.
The staging server 30 can be linked to one or more staging clients 62. Each staging client 62 may in turn be one or more computers, such as personal computers. One or more testers can access each of the staging clients 62. In one embodiment, the testers access the staging server 30 via the staging clients 62 in order to validate and verify the information stored by the content aggregation management and staging module 20 in the database 50. The testers can input one or more queries into the staging client 62 and compare the search results returned by the staging server 30 to expected search results.
In an alternative embodiment, the staging client 62 may be configured to automatically generate a series of queries for which expected results are known. The exact search results need not be known by the staging client 62. Rather, the expected search results only need to be known to a reasonable level of certainty. The staging client 62 inputs the queries to the staging server 30 and compares the search results against the expected results.
In still another embodiment, the staging server 30 can generate verification queries without the need for a staging client 62. The staging server 30 may include a predetermined list of queries and corresponding expected search results. The staging server 30 can execute the queries and compare the results retrieved from the database 50 against the expected results. In this embodiment, the staging server 30 performs content validation, verification, and quality assurance independent of the staging server 62.
The staging server 30 can be in turn coupled to one or more public servers 40. Each public server 40 is also coupled to the electronic database 50. Each public server 40 can store all or some of the content of the database 50. In that way, all or portions of the database 50 can be published to the public servers. The public server 40 can provide access to one or more public clients 64. Each public client 64 can also be a computer such as a personal computer. Alternatively, the public server 40 can provide html mediated access via the internet or public web with one or more of the following access controls for particular subsets of the electronic database: public open access; username and password validation; user IP range validation; referrer IP range validation; institutional intranet controls; or other access controls. In one embodiment, the public server 40 can only access data that has been validated and verified by the staging server 30.
As described in further detail below, one or more end users may access the electronic database through the public client 64. The end user can input a query into the public client 64 and the query can run through the public server 40 to access the electronic database 50. The public client 64 is then provided a list of results, which may be source-type independent.
The electronic database 50 and the public server can include a database stored in an electronic storage system. The electronic database 50 can be configured, for example, using one or more hard disks, RAID disks, optical disks, magnetic media, ROM, RAM flash memory, NV-RAM, and the like, or some other storage.
The database 50 can be configured to store information such that it is accessible by one or more modules, such as the content aggregation management and staging module 20, staging server 30 and public server 40. Alternatively, the database 50 can be configured such that instances within the database 50 are accessible to a subset of modules. In one embodiment, the database 50 is configured to have multiple instances of the same record. For example, a portion of information within the database 50 may only be accessible to the content aggregation management and staging module 20. Another portion of information within the database 50 may be accessible only by the staging server 30. Still another portion of the information within the database 50 may be accessible only by the public server 40.
In an embodiment of a database 50 configuration, the content aggregation management and staging module 20 can access data that includes raw data, data that has been only partially imported, verified data, and validated data. The staging server 30 can access a duplicate instance of data accessible by the content aggregation management and staging module 20. Data records that are ready for validation and verification can be copied into a database 50 portion that is accessible by the staging server 30. Thus, the staging server 30 can access a duplicate instance of a subset of the data accessible by the content aggregation management and staging module 20. Additionally, data that is verified and validated by the staging server 30 can be copied into another database 50 portion that is accessible to the public server 40. Thus, the data that is accessible by the public server 40 can be a duplicate instance of a subset of the data accessible by the staging server 30. Thus, in this embodiment, there may be three instances of the same data record, one that is accessible to the content aggregation management and staging module 20, another that is accessible to the staging server 30, and another that is accessible to the public server 40.
In the following description the following terminology is used. A natural form entity is a singularly identifiable real world entity, for example, a person or a book. A natural form representative is either the natural form entity themselves or an agent acting on their behalf. For example a natural form representative of a person type entity can be the person themselves. A surface form entity is a representation in the database system of a natural form entity which has insufficient information or its information is not deemed sufficiently reliable (or has not yet been verified or checked) to satisfy the criteria of a definitive form. A definitive form entity is a representation in the database system of a natural form entity which meets defined criteria. The criteria are established such that there is a very high confidence level that the definitive form entity has a one to one correspondence with a single natural form entity. The very high confidence level can be set such that an individual looking at the available information within the system would make the same determination. For example, the definitive form entity includes sufficient information to identify with very high confidence the singular associated natural form entity, the record meets a defined level of completeness and the definitive form entity is believed to be unique among definitive form entities within the database (de-duplicated).
FIG. 2A is a data model of an entity relationship of an electronic database. The data model of the entity relationship can be, for example, a logical model of the database implemented in the electronic database 50 of FIG. 1. The entity data model includes three primary entity types; organization 210, person 220 and publication 230, and can be expanded to include other types, such as tools, equipment, or software tools. Each of the entity types can be definitive form or a surface form. The entity data model may also include ontology 240 and lexicon 250 entity types. Each entity type can be, for example, a table having one or more records identifying organizations relevant to the discipline specific database. Each entity record (or entity) includes attributes that describe or characterize the natural form which the entity represents. For example, a person entity 220 can have attributes such as first name, middle name, and last name.
The organization entity 210 can be, for example, a record of a university, research organization, a hospital, a government agency, a corporation, or a department of a larger organization. The larger organizations having departments or sub-units can be referred to as parent organizations. Additionally, a parent organization may have a plurality of child organizations. Organizations that belong to larger organizations can be referred to as child organizations. Child organizations can be, for example, departments, schools, subsidiaries, centers, divisions, sub-agencies, programs, and the like. A child organization may also be a parent organization. A parent organization such as an academic department, college, or school may have some sub-divisions that grant separate degrees. For example, a school of medicine may have sub-departments that focus on specific medical specialties, such as neurology, pediatrics, and the like. The sub-departments are children of the parent school of medicine. Similarly, the school of medicine is the child of the university. Thus, in this example, the school of medicine is both a parent organization and a child organization.
The entities, 210, 220, 230, 240, and 250 are linked by relationships, for example 222 or 224. The relationships between entities shown in the data model are only examples that are representative of the database, and are not exhaustive representations of all possible relationships in the database. Examples of relationships linking entities include degreeto/degreefrom 214 relationship linking persons 220 with organizations 210 and authored/authored by 224 relationship linking persons 220 with publications 230.
Typically, each relationship is a two-way relationship. The relationships are directional but have a symmetric counterpart. For example, for each person 220 that has the relationship of being a member of an organization, that organization 210 has a relationship of having a member which is the person. The relationships may be between different entity types or may be between different entries within a single entity type. Examples of relationships linking different entity types include member/memberof 212 relationships and degreeto/degreefrom 214 relationships linking organizations 210 to people 220. Other examples of relationships linking different entity types include authored/authoredby 224 relationships and edited/editedby 222 relationships linking persons 220 to publications 230 and describes/described by relationships linking either organizations or people with publications. Example of a relationship linking two entity records within the same entity type includes the cites/citedby 232 relationship linking two different publications within the publication 230 entity type and parent/child or affiliated with/affiliated with relationships linking different organizations within the organization entity type.
The person entity type 220 can include a list of people including, but not limited to, authors, important people in the field, affiliates with certain important institutions, corporate board members, executives, or employees, government officials, or individuals within certain professions, such as doctors, lawyers, or entertainers. Person data can include, for example, the first, middle, and last names corresponding to the person. Person data can also include, for example, a textual statement of research or professional interests, a link to the person's web page, professional tools, techniques, or resources, and the like. The statement of research interests may be analogous to the type of statements typically found on a person's departmental website. Links to Internet pages can be, for example, links to a person's home page or a link to a web page listing a person's publications.
The publications entity type 230 can include whole publications or only parts of publications. The publications may include, but are not limited to, books, chapters, journal articles, dissertations, and grant types. The organization entity type 210 can include academic departments, universities, corporations, research groups, or any other group.
The lexicon entity type 250 can include key terms, phrases, or vocabulary associated with, for example, a discipline-specific database. The lexicon 250 can include, for example, the terms listed in the various indices of publications. For example, some or all of the terms listed in the index of a book can form the basis of a lexicon. The book can be, for example, a book that is a record in the publication entity 230. The aggregation of terms listed in the indices of all of the book records can form the lexicon.
Alternatively, the lexicon may be developed based on counting the number of occurrences of terms in publications. The potential lexicon records may be ranked across multiple publication indices. For example, the potential lexicon records can be compared against terms included in the index of a book. Some words that appear with great frequency may correspond to common words that have no ability to identify discipline-specific subject matter. Other words that appear with lesser frequency may be key to a particular area of interest within the domain of discourse.
The potential lexicon records may then be used as query terms and tested against candidate publications to determine the ability of the record to discriminate meaningful information. Thus, some terms that initially rank high as appearing frequently in the indices of books and number of occurrences may have no ability to discriminate meaningful information. For example, the terms may be too common or may have multiple meanings. Terms that rank high and have the ability to discriminate meaningful information may be included as lexicon 250 records. Lexicon 250 records can be useful in revealing a vocabulary of terms used within a discipline or field. However, lexicon 250 records may not provide a user with an organization of concepts within the database field or discipline.
The ontology entity type 240 can include records of topics arranged in a topic tree. The ontology 240 includes key concepts of the discipline specific database and relates the key concepts in a categorized manner. The ontology 240 records may thus be included in or formed of key terms from the lexicon 250 records.
As was referred to above, a record listed in an entity type table can be listed as either a surface form or a definitive form. A surface form can include data as it looked, literally, when it was imported from an external source. Surface forms may hold incorrect, outdated, or incomplete data, since sources are known to be flawed and/or incomplete. A definitive form entity is the "correct" representation of an entity. A definitive form entity can be based on a combination of one or more surface forms and information sources external to the electronic database. The creation or derivation of a definitive form entity from a corresponding surface form is referred to as "normalization" and may be manually performed, automated, or a combination of manual and automated actions. For example, when deriving or creating a definitive entity form from a surface form, abbreviations may be expanded, data filled in, or some other data manipulation, transformation, processing, or expansion may occur. In one embodiment, surface forms and definitive form records (entities) can be stored in different, but mostly isomorphic, tables. In another embodiment, both surface form and definitive form entities are stored in the same tables. Occasionally, the surface form of the record coincides with the definitive form record. For example, a definitive form record of a person may be their full name using complete first, middle, and last names. Imported data may refer to the person by their complete first, middle, and last names. Thus, the surface from of the person from the imported data matches the definitive form record.
As will be discussed in further detail below, person data records can be imported and/or manually input from one or more add-hoc information sources, such as websites. A surface form record of a person imported from a website can be stored in the same table as the definitive form version of that person. Storing both forms of the record in the same table minimizes the amount of management code, and allows surface forms to act as definitive form entities by flipping a status bit. Where a majority of content will be published without normalization, for example, journal and journal author content, use of the same table for both forms saves a great deal of effort.
A definitive form entity record represents a real world instance of an entity. For example, there should be one and only one definitive form entity in a single discipline specific database for a specific natural form person known as "Dr. Sadanand Singh". However, if there are multiple natural form people with the name "Dr. Sadanand Singh", each will correspond with a distinct definitive form entity. A surface form is the literal text that we might see in some book, or in some reference, or on some web page, that describes an entity. For example, the entity Dr. Singh may have published two books and appear on a website. The entity may have three surface forms, and each might be different.
A first book's text may list the person as "Dr. Sadanand Singh", a second book may list the person as "Sadanand Singh", and a website may list the person as "Dr. S. Singh". Furthermore, each surface form name may state a different surface form affiliation. Dr. Singh may have been at different institutions when each book was written, and the implied affiliation on a particular website is that the person is affiliated with the organization represented by that website. Thus, there is an abundance of surface forms from various books, references, and web scraping or harvesting. Additionally, there may be no actual precise information about entities.
The normalization process, then, establishes the correct natural form entity for each surface form, and implements the canonical or standardized statement of each entity's properties, such as name, affiliation, email, etc., and defines such statement as the definitive form representation.
It may be advantageous to create the definitive forms of surface forms in order to determine more accurate relationships between the various entities. For example, it may be difficult to establish a complete relationship of author to publication without generating a definitive form entity of the person corresponding to numerous surface forms of the person. A definitive form of an entity eliminates the creation of numerous partial relationships linking different surface forms that correspond to the same definitive form. Numerous surface form relationships do not provide the information that can be provided by a definitive form relationship. For example, different surface forms of the same person entity may have independent relationships to different organizations. The definitive form entity corresponding to the different surface forms will have the relationships to all of the different organizations. The database can return more complete search results when the definitive form relationships are known.
Typically, the surface form contents of an entity are never updated or changed. If a surface form were updated or changed, the ability to look at the original source record would be lost. Therefore, if a surface form record needs to be changed, a new entity is typically created, and the surface form entity linked to the new updated record in the new entity. The surface form of the original record as well as the surface from of the new entity record can be linked to the same definitive form record.
In one embodiment, each entity and relationships between entities can also include associated meta data. In general, the meta data is used to provide information about the underlying entity. For example, the meta data can include the following types of information:—start and end date of the underlying entity or the date of occurrence of the underlying entity; evidence—the source of the evidence of the existence of the entity or relation between entities and a ranking of the believability of that source, for example on a scale of 0 (not believable) to 100 (undeniable); exposure—can be set to be triggered to make the record or portions of the record not visible in certain circumstances; and notes—explanatory notes. All types of meta data could but would not necessarily be used for all entities. In addition metadata can be used for attributes of entities. For example the attribute of last name of a person entity could have a start and end date when a person's name has changed, for example through marriage. In addition the source of the evidence of that name change could be noted and the believability of that source could be ranked. The exposure field of the metadata is useful when the database is published to different customers or for different uses. For example variations of the database which hide or expose different fields, depending on the service provided to that customer, could be controlled through the exposure field.
FIG. 2B is another embodiment of an entity relationship data model. The embodiment of FIG. 2B includes only the three primary entity types; publication 230, person 220, and organization 210. The data model omits the entity types ontology 240 and lexicon 250 found in the data model of FIG. 2A. The data model of FIG. 2B also shows directional relationships, for example 222, 224, and 232. However, the examples of directional relationships are shown in a single direction solely for the sake of brevity. The relationships typically include a symmetric counterpart as shown in FIG. 2A. Meta data can also be used with this simplified data model as was described above.
The data model shown in FIG. 2B represents a simplified form of the data model shown in FIG. 2A. The simplified data model may be implemented, for example, in disciplines, fields, domains of discourse, organizations, or geographical areas in which a specialized vocabulary is not used. Alternatively, the lexicon and ontology entities may be omitted in databases that are directed towards specialists in the discipline field. There can be other situations in which either the lexicon or ontology entities are omitted from the data model.
FIGS. 2A and 2B represent examples of possible data models for the entities. Other data models, can include additional entities or may omit one or more entities from the data models of FIGS. 2A and 2B. For example, an alternative data model can include a person entity and a publication entity and omit the organization, lexicon, and ontology entities. A database implementation of the data model may put no emphasis on the possible organization relationships but may only be concerned with relationships between people and publications.
FIG. 3 is an entity schema that is an example of a schema for the data model shown in FIG. 2B. The entity schema includes a number of entity tables corresponding to the entities shown in the data model. One example is provided of a relationship table interrelating two of the entity tables.
Each entity table includes a primary key that uniquely identifies the record in the table. Within each table, there also exist a number of attributes associated with that primary key. The entity ID is a unique integer key which can be, for example, an auto-incrementing sequence number that identifies the primary key.
One or more of the attributes can also be a foreign key. A foreign key is a field in a relational database table that matches the primary key of another table. Thus, an attribute that is a foreign key can also have its own attributes. The foreign key can be used to cross-reference the tables. Each of the primary entity tables includes an entity ID as the primary key in the table.
In addition to the possibility that one or more of the attributes themselves have attributes, the attributes may be structures. For example, an address attribute can have as its structure street, city, state, and country. Alternatively, the elements of the structure can be attributes of the address attribute.
The attributes include standard attributes, which are provided for every entity type. Additionally, entity-specific attributes can be included for particular entity types.
In one embodiment, the standard attributes include an entity ID, a data origin, a time stamp denoting a specific time of creation, a normalization status, a pointer to a normalization instance, a primary representation of the entity, the full entity hash number, and a first published date and time record.
The entity ID is a unique primary integer that identifies the particular entity. The source ID represents the data origin for a record. The data record defines when the source record was initialized and how the record was created. This record never changes once it is created.
The standard attributes included across the different entity tables are also referred to as standard management columns within the table. In the embodiment described above, the management columns are:
entity_id (csorg_id, cspersond_id, csorg_id): The unique primary integer key identifying the record. The primary integer key may be an auto-incrementing sequence number.
source_doid: The data source or origin of the particular record. This value defines the who/how/when of this record's origination. The value is initialized when the record is created, and typically never changes.
create_timestamp: The creation timestamp indicates the specific time the data record was created. This attribute may seem redundant with source_doid, but it's not. A single source_doid may be created for a data input session when a system administrator logs in. Therefore, the granularity of the source_doid value can be fairly large. Many data edits can occur in one session. The timestamp gives a micro-view of when the content is created.
norm_status: The normalization status is indicated by this value. This attribute includes a set of codes that indicate whether the record has just been imported, has been auto-normalized, has been manually verified, or is ready to be published.
norm_cs_id: This attribute provides a pointer to a definitive form instance of the associated record. For example, a person record may be imported from scraping a department's website. This record is a surface form and a corresponding data origin indicates a rawsource. If this record is incomplete or inaccurate, then a new record is created. The new record may be created, for example, by manual effort or by automatically merging different records for the person. The norm_cs_id of the surface form record points to the entity_id of the definitive form record.
norm_doid: When the norm_status or norm_cs_id is updated, the norm_doid records the data origin of that updating work. A history of doid's is typically not required nor is the history maintained.
csentity_xml: The attribute represents the full record for a given entity. For example, the full record for an entity can be stored as XML in an entity document type definition (DTD) element. The full record is the primary representation of the entity. For example, a person entity has an XML description that includes its first name. The first name is stored both in the csentity_xml element and in the table column 'firstname'. However, the column data is just a reflection of the primary content in the XML—it is represented at the column level to make selections more intuitive and efficient as opposed to mining the XML. However, when content is updated, it is typically updated in the XML and reflected in the column value.
csentity_xml_hash: The full csentity_xml can be big. And we want to perform exact-match lookups on it. Therefore, we store the Java String hash code of the csentity_xml here, so that we can quickly narrow in on one or more matching items. This is because you can't place an index on a text field in MySQL.
firstpublished_datetime: This attribute indicates the date and time that the associated record was first published to the runtime system. If this field is null, then the record has not yet been published. A system administrator may have more freedom to delete, split, or merge unpublished record. If this field is null, then we need to preserve this record's identity, because an administrator may be referring to its ID in some saved state, such as in an electronic bookshelf.
For a given entity in the database, it is easy to know whether it is a surface form, and separately to know the normalization status of the entity. An entity is a surface form if its DataOrigin refers to a DataSource that is_rawsource. A surface form can also be accepted for publication, meaning, its content is valid and will be presented to the user. Every entity has a status flag (norm_status, an integer) which indicates whether the given data has been accepted for publication.
FIG. 3 shows table definitions for the three primary entity tables, organization 310, person 320, and publication 330. Also depicted are their dependencies on the DataOrigin table 340. In addition, an example of one relation table (memberof) is also depicted. The relationship table is shown here to illustrate that the management columns in a relation table can be the same as the management columns in the entity tables.
As noted earlier in the description of the full record, the entity-specific columns exist in the tables to make querying more efficient and obvious. These column values are merely reflections of the fundamental data stored in the full record for each entity, for example the entity XML DTD. The full record usually contains more information than what is reflected in the columns. If an entity's data changes, then the full record is typically updated and the updated values reflected to the table columns.
The entity schema includes an organization table 310. An organization identifier 312 is the primary key for the organization table 310. The organization identifier 312 identifies individual records within the organization table 310. Organization attributes 314 can include the name of the organization, one or more abbreviated names of the organization, addresses, degrees granted, publications published by the organization, and the like, or some other attributes. Some of the attributes, such as degrees granted will only contain data that is relevant to the specific discipline. For example, a medical-based database may only be concerned with medical degrees and medical specialty degrees conferred by a university.
Similarly, a person table 320 is used to catalog people in the database. A person identifier 322 is the primary key for the person table 320 and is used to identify each record of a person stored within the database. Person attributes 324 can include, for example, first name, surname, and middle name. Other attributes within the person table 320 can include, for example, honorific, lineage, home page, and the like, or some other attributes. The honorific attribute can identify the title, such as "Dr." or "Sir" associated with the entity. The lineage attribute can identify whether the person is known as "Jr." or some other lineage designation. Other attributes provide other related information.
A reference table 330 is used to catalog the publications stored in the database. A reference identifier 332 is the primary key for the reference table 330 and is used to identify each record of a publication stored within the database.
The entity schema shown in FIG. 3 also includes a data origin table 340. The data origin table 340 shows the identity of the person entering the data, for manual data entry, or the origin of the data, for automated data import. The identity of the person or data source is stored as a data origin identifier 342. The data origin identifier 342 is the primary key for the data origin table 340.
Additionally, a relationship example is provided in between the organization and the person tables. The memberof relationship linking the organization and person tables is provided only as an example. A relation such as "membership" or "memberof" can indicate historical affiliations that are known for the person. The affiliations may be a subset of all true historical affiliations. The affiliations can also be, for example, labeled as current to distinguish contemporary affiliations from historical affiliations. Moreover, meta data can be used to describe the time periods during which each affiliation was current. As will be seen below, there are additional number of relational tables that may exist linking the various entities.
FIG. 3 also includes a representation of meta data 325. Meta data can be associated with any entity and with any attribute of any entity.
In addition when the database system includes more than one discipline specific data base, it can be useful to have a global unique identifier assigned to entities that exist in more than one of the discipline specific databases. Therefore, if searching is conducted across more than one of the data bases, duplication of results can be detected. Further, each discipline-specific database may have discipline-specific representations of entities, even if those entities occur in more then one such database. For example, the representation of a person in a database specific to cancer may include only cancer-specific publications authored by that person and cancer-specific organizations to which the person is a member; meanwhile, the same person may be represented within a neuroscience-specific database that only includes neuroscience-specific publications and organizations. In this case, there may be some customers, purposes, or service levels for which both cancer-specific and neuroscience-specific publication & organization sets may be relevant and published for access using the global unique identifier to detect duplication and aggregate information. Simultaneously, for other customers, purposes, or service levels, only the discipline-specific information may be relevant and published for access.
FIG. 4 is an alternative embodiment of an entity data model. The entity data model of FIG. 4 is particularly targeted towards relating information from academic institutions. The entities in the data model include a person 220, ontology 240, and lexicon 250 as in the data model of FIG. 3. Additionally, the data model includes entities that are institutions 410, courses 420, books 430, book elements 440, and other publications 450.
Examples of relationships linking the various entities are provided in FIG. 4. For example, the reference relationship 432 links the book 430 and ontology 240 entities. Additional examples include the cites relationship 442 linking the book element 440 and other publication 450 entities.
The entities shown in the data model of FIG. 4 have analogs in the data model shown in FIG. 2A. However, there are some entities in the data model of FIG. 4 that do not appear in the data model of FIG. 2A. For example, the course entity 420 shown in FIG. 4 does not appear in the data model of FIG. 2A and is not represented in any of the entities of FIG. 2A. Thus, the data model may be structured differently for different discipline specific databases, customers, purposes, or service levels. The data model can be tailored to capture entities, such as courses 420, that are more prominent in particular disciplines.
FIG. 5 is a relationship schema. The relationship schema of FIG. 5 shows the tables that link the various entities of FIG. 2B. The entity tables, organization 310, person 320, and reference 330 are only shown with their primary keys and are not shown with their attributes. Additionally, the metadata that can be associated with each entity and attribute are not shown.
The relationships can also include attributes that describe or characterize the relationship. For example, the memberof relationship 520 can describe the relationship between a person 320 and an organization 310. The memberof relationship can include the "role" attribute that describes the role the person 320 (that is the member) plays in an organization 310. For example, possible values for the "role" attribute include "professor" or "lecturer."
Each of the relationship tables includes a primary key that uniquely identifies the records stored in the table. Additionally, each of the tables may include one or more foreign keys that match the primary keys of another relationship table or of an entity table. The foreign keys can be one or more attributes associated with the relationship. For example, the degree grant relationship includes a degree grant ID as the primary key. Additionally, the degree grant relationship includes a grant organization ID as a foreign key and a degree person identifier as a foreign key. The degree granting organization and the degree receiving person are referred to by the degree grant relationship. FIG. 5 shows a relationship schema that can be implemented in the majority of discipline specific databases. Some databases having entity data models different from those shown in FIGS. 2A-2B can include additional relationships or can omit some relationships.
Some relationships are primarily related to organizations. A parent organization relationship table 500 includes a parent organization identifier 502 as the primary key identifying the record. The foreign keys 504 identify the relationships to other organizations. For example, one of the foreign keys can identify the organization identifier of a parent organization, if any. Similarly, a different foreign key can identify the organization identifier of a child organization, if any.
Other relationships are more directed towards defining the relationships between various people or between people and organizations. A degree grant relationship table 510 identifies degrees granted. Foreign keys 514 identify degree granting organizations and persons to whom the degree is granted. Similarly, a member relationship table 520 includes a member identifier 522 as a primary key of the table. Foreign keys 524 identify the organization identifier and person associated with the organization. An advisor relationship table 530 has an advisor identifier 532 as the primary key. Foreign keys 534 identify a person that serves as the advisor and a person that was advised.
Still other relationship tables identify the relationships between people and publications. Author and editor relationship tables, 550 and 560 respectively, identify publications authors and editors. The author relationship table 550 includes foreign keys 554 that identify the publication and the person authoring the publication. Similarly, the editor relationship table 560 includes foreign keys 564 that identify the publication and the person editing the publication.
Other relationship tables identify relationships between publications. The container relationship table 580 includes foreign keys 580 that identify the container reference and the identity of the reference contained in the container reference. Similarly, the citation relationship table 590 includes foreign keys 594 that identify the citing reference and the reference cited in the citing reference.
In order to generate the database, raw data must be aggregated and parsed into the various tables of the database. FIG. 6 is a representation of a content aggregation and management schema. The schema includes three entities: content editor 620, data origin 610 and data source 630. The data source table 630 represents the raw source from which the data is retrieved. For example, the data source may be a journal article, a book, or a repository of journal articles or books. The data origin table 610 includes a time stamp and an origination date to indicate a time of data origination. Thus, the data origin represents the time that the raw data source was imported into the database. The content editor table 620 identifies the system administrators that may edit content stored within the database. The content editor may be identified with editing sessions in order to provide an update history.
As we stated earlier, the logical data model can have a number of different implementations or realizations. Different software implementations include extensible markup language (XML), Java architecture for XML binding (Jaxb), and Java XML integration (Jdom). The different implementations can all reflect the same underlying data model. The implementations can be interchangeable. There may be reasons that one implementation is preferred over another.
XML is one possible implementation. XML is an exportable and importable text-based representation of the data model. An XML implementation may be preferable when importing data from third parties, and when transmitting content between major sub-systems. For example, when a server delivers a detailed representation of an entity to a client at runtime, it can send XML. Also, XML text can be stored in a database when an entity is persisted because XML is language neutral.
JDom is another possible implementation. It is a convenient in-memory representation of XML for a Java program. Attributes and child elements can be accessed by name in a flexible way. It can be easy to create and manipulate XML in-memory using JDom, but, it can also be easy to create XML that does not conform to a given document type definition (DTD). A JDom implementation can be advantageous for cycling through all attributes or relations on a given object without caring much about DTD-conformance or perhaps the specific meanings (types) of the attributes and relations. For example, a content editor explorer entity view can use a JDom implementation to simply display in HTML all attributes and relations on a given entity. Convenient methods for translating back and forth between XML text and JDom representations are available.
Jaxb is perhaps the least obvious implementation, but perhaps the most powerful. A Java class file can be created for every element in a DTD. A Jaxb implementation allows type-safe getters and setters to construct and access XML content in-memory. XML text can be read from and written to in-memory Jaxb classes in a way that is guaranteed to be syntactically correct with respect to the DTD. For example, the Jaxb pre-compiler creates a java class that includes methods getFirstname( ) and setFirstname( ). A Jaxb implementation may be preferred when needing to create DTD-conformant XML, or for type-safe compile checking. Jaxb is the default representation of an entity when interfacing with the database. Jaxb objects can be converted to and from both XML text and JDom using conversion utilities.
A recent enhancement to the Jaxb model is the declarative statement of attributes and relations, which allow the developer to get and set attributes and relations in Jaxb in a type-safe way, but using flexible naming analogous to JDom. This capability was added to handle general purpose entity editing, but may be useful in other contexts as well (for example, merging data). When using declarative attributes and relations, a logical data model can change with no changes required to the editor.
Thus, the logical data models can be implemented in one or more ways using one or more modules. The modules can be, for example, hardware modules, software modules, or a combination of hardware and software modules. Where a module is implemented as a software module, the software may be stored on one or more storage devices, and executed in one or more computers or processing devices. Each of the implementations detailed in the following figures can thus be implemented in hardware, software, or a combination of hardware and software.
FIG. 7 is a functional block diagram of the source transparent database system. Information from raw sources such as books, dissertations, journals and ad hoc sources are aggregated, imported, and supplied to a search engine which then supplies the data to a client. Raw data must first be aggregated, parsed into the database and staged in a quality assurance staging server prior to being supplied to a client server.
As previously discussed, the database can be configured to include discipline-specific information. A discipline-specific database enables a user to obtain results that are focused on the discipline or domain of discourse that is of interest.
In order to generate a discipline-specific database, the information that can be imported into the database must be filtered to eliminate non-relevant sources. The filtering operation can be performed in the import module for the particular type of raw data. Thus, each of the import modules 702, 704, 706, and 708 can include a filtering operation or filtering module.
In one embodiment, a filtering module can be automatic text classification (ATC) software implemented in one or more computers, hardware, or devices capable of executing the software. ATC software can use predetermined example articles, such as journal articles, books, grants, or dissertations that are known to be related to the desired profession or discipline. The predetermined example articles are used by the ATC software to create a model of terminology used in information sources related to the field. The ATC software estimates whether a given information source, such as a journal article, book, grant, or dissertation is likely to be related to the discipline. For example, the ATC software can determine a likelihood based in part on a comparison of a list of key terms or a ranking of key terms against a predetermined threshold. If the ATC software determines that the likelihood is higher than a predetermined likelihood threshold, the article is filtered into the database, or is otherwise selected for inclusion into the database.
The manner in which raw sources are imported into the database depends on the type of the raw data source. Books are one of the raw data source types and can be converted using the conversion module 702. Books typically include a table of contents, bibliography, index and body content in addition to summary data such as title, author, abstract, and the like. In comparison, journals and dissertations have a different, but similar, data source types and are imported using a journal auto-import module 704. Journal articles and dissertations are similar in that they include the same type of summary data. However, journal articles and dissertations typically do not include the table of contents or index typically found in a book.
Ad hoc sources include those raw data sources that do not have a standard format. Information from ad hoc sources may be imported using a scraping module 706 or may be imported using manual keying 708.
The scraping module 706 can be, for example, a module configured to handle a particular ad hoc data source. For example, the scraping module 706 can import microfiche text, convert the text to an electronically readable format, and import the information into the database. In another embodiment, the scraping module 706 can download web pages, convert them to entities and relationships, and import the information into the database. The web pages can include information including, but not limited to, authors, publications, organizations, and the like, or some other information that is stored in the database. Publications can include articles, books, grants, clinical trials, and the like, or some other publication. The scraping module 706 can include multiple modules that are each configured to import data from a different type of ad hoc data source.
In one embodiment, a scraping module 706 can be configured to convert grants to entities and relationships and import the information into the database. Grants, in this context, refer to grant proposals and grant awards. Grant proposals and grant awards differ from books and journal articles because a grant is typically related to a field of research or study that is yet to be performed. Additionally, a grant is typically associated with a value, such as a dollar amount. The ability to import grant values and grant information allows a researcher to search the discipline specific database for information relating to the most lucrative grant values, whether proposals or awards, and the persons associated with that grant. Such information can reveal, for example, information disclosing the most active participants in a field of study.
Data from sources that are so unique as to only occur a minimal number of times can be imported using manual keying 708. For example, data from a handwritten manuscript may not be conducive to electronic import and may need to be imported using manual keying 708.
As was discussed earlier, data that is imported into the database is imported as a surface form. A surface form is how the data looked when it was imported from the external source. One type of imported data, for example a book, may generate more than one surface form. For example, importing data regarding a specific book will generate a surface form entity for the book itself and a surface form entity for the author. Many different surface forms may identify the same information or entity. For example, a name will identify only one individual, however, that individual may be known by several different names. For example, the individual may be named according to their first name and last name, their first initial and last name, or their first initial, middle initial and last name. A definitive form represents the true data identity. Each of the surface forms identifying that entity are linked to the definitive form.
Thus, each of the data import modules, 702, 704, 706, and 708 links to a normalization module 710. The normalization module 710 converts some or all of the surface forms from the import modules to definitive forms. An embodiment of a normalization module 710 is provided below in FIG. 14A.
The output of the normalization module 710 is coupled to or imported to a publication module 720. That data can include definitive form entities and can also include surface form entities. The publication module 720 examines the imported data and prepares it for access by, for example, the search engine. One aspect of the operation of the publication module is indexing. The imported data can be indexed in one or more fashions in order to optimize specific types or categories of searching which will be carried out by the search engine. For example, in one embodiment the data is indexed for key word searching of the various types of publications contained within the database. Alternatively, the database can be indexed such that each person entity has an associated collection of publications. Alternatively, only the key words from publications authored by a person entity would be in the index for each person. In that way key word searching can be performed upon the collection of publications determined through normalization likely to be authored by or associated with an individual (for example, a definitive form person entity). For example, such an index allows the boolean search of "neurology and dendrite" to identify person entities whose total collection of publications meets the boolean criteria. For example such an index does not require that both terms appear in the same publication. This indexing can use the publications of the person entity to stand for or represent the expertise or interest of the person entity. Alternatively, different types of indexes can be created by the publication module 720.
In addition, the publication module 720 can remove or suppress selected parts of the data base. For example, attributes having associated meta data with a low believability can be suppressed or removed by the publication module 720. Alternatively, the data base can be published in different forms for different clients, purposes, or service levels. Clients interested in only certain attributes or certain types of searching can have the data base published for them with undesired attributes (or entity types) removed and desired indexes created. For example, the data base can be published use by users interested in identifying experts with selected expertise, identifying institutions which fund specific types of research, or identifying prospective students.
Further, the database can be published without searchable indexes, but in such a way that published entities could be imported by or integrated directly within some other database system. For example, in one embodiment, person entities could be published for direct integration within a customer relationship management system (CRM), which may not require direct searching across entities. In this embodiment, surface form person entities created in the CRM system by sales or marketing representatives could be imported to the database. These surface forms are then normalized using other data from the CRM system and/or data imported from other data sources. Such sources could be automatically imported, manually entered from ad hoc sources, or input using some combination of automatic and manual processes. Normalized information, which may include standardized entity representations and other information resulting from the normalization process, can then be published so as to provide direct access by the CRM system and/or by the sales and marketing representatives. This embodiment could be implemented with a subset of the database system as described in other example implementations.
The output of the publication module 720 is coupled to a QA or staging server 730. In one embodiment, the staging server of FIG. 7 coincides with the staging server 30 of FIG. 1. The QA or staging server 730 can operate identically to a client server 740 except that the staging server 730 is not accessible by external clients. The staging server 730 can be accessed by an internal process or module to validate and verify the data imported from the raw sources.
Once the data has been validated in the staging server 730, the data (which can represent a discipline specific data base) is coupled or transferred from the staging server 730 to a client server 740. The client server 740 may be, for example, a personal computer or networked computer and may be the public server 40 of FIG. 1. The client server 740 may be accessed by a client computer 750 directly connected to the server. Alternatively, a client using a browser 760 may connect to the client server 740 over a network connection.
FIG. 8 is an application schema for a book import process. As will be seen in subsequent figures, the book import schema may be implemented in a single module or in a plurality of modules. The book import process can be used to import data from books or dissertations into the database. Reference to books in the description of the figure should be interpreted to mean books, dissertations, and other publications that can be imported using the book import process.
As shown in FIG. 7, a conversion module converts a raw book source file into a book file. The book file is identified as a record in a corresponding book file table 810. The book file can be linked to multiple book file roles and can be tagged with a data origin. The data origin table 610 may be identical to the data origin table of FIG. 3. The data origin table 610 identifies the source of the data, the time that data was imported into the database, and the system administrator or content editor that initiated the data import. The book file table includes foreign keys 814 that link the book file to a reference ID record, which is the entity record for the book.
Each imported book file refers to a single reference instance. Each imported book file can contain various content types. For example, a single book file can include a plurality of chapters, a table of contents, as well as an index.
The parsed book file is labeled in the book file role table 820. The book file role table 820 includes attributes 824 that identify the contents in the book file and the role that the content plays within the book file. For example, chapters may be identified as having different roles. Additionally, the index may be tagged as a book file role.
FIG. 9 is a functional block diagram of a book import system that can implement, for example, the book import schema of FIG. 8. The book import system of FIG. 9 is shown as comprising multiple modules. However, one or more of the modules may be combined into a single module.
The book import system performs importation of information from books that are in electronic file formats. For example, the electronic files may be Quark or PDF files. Although the book import system is shown as converting either Quark files or PDF files into XML data, other raw source file formats or other conversion formats may be used.
Electronic book files 902 are supplied to a file import user interface (UI) module 904. The file import user interface module 910 generates a filename and strips information such as a book ISBN from the electronic file. An automated file name standardization module 912 within the UI module 910 generates the file name. An ISBN extraction module 914 in the UI module 910 extracts the book ISBN. Additionally, a chapter extraction module 916 in the file import UI module 910 strips a chapter reference record from the electronic file. The filename ISBN and chapter reference numbers may be supplied in the electronic book file in a standard form. Alternatively, the filename ISBN and chapter references may be input into the file import user interface manually.
Once the file import user interface gathers the skeleton outline of the book, the book importation process can begin. The book import system shows two different book import processes. A first process is provided for Quark-encoded files. A second process is provided for PDF-encoded files. Regardless of file format, an extraction module initially extracts each chapter from the electronic book file and establishes a file for that chapter.
If the book is imported from a Quark file 922, the book import system processes the chapter files in a data conversion module 916. The data conversion module 916 creates an XML file conforming to a predetermined document type definition for each of the chapters and element types of the electronic book file. For example, an XML file conforming to a document type definition (DTD) is generated for each chapter, the table of contents and the index from the electronic book file. In one embodiment, the data conversion module 916 is a NOONETIME conversion process that creates an XML file 932 conforming to a NOONETIME DTD file.
The XML files 932 generated by the data conversion module 916 are then input to a second conversion module 936. The second conversion module 936 transforms the XML files 932 conforming to the NOONETIME DTD to, for example, XML files conforming to extract-source document type definitions.
Alternatively, if the electronic book file is in PDF format, the PDF file 924 is provided to an optical character recognition (OCR) module 928. The OCR module 928 transforms the PDF file 924 into a table of contents, index and body files 934. The OCR module 928 extracts the text from the PDF file for each of the file types.
The text files 934 output from the OCR module 928 are then provided to a conversion module 938. The conversion module 938 converts the text into XML files conforming to extract-source document-type definitions. Thus, the book files are transformed into extract-source DTD compliant XML files 940 regardless of source type.
The extract-source XML files 940, whether originating from Quark files, PDF files, or files having some other format, form the basis of the database extraction. A table of contents extraction module 942 extracts the table of contents information from the extract source XML files 940. The table of contents extraction module 942 transforms the table of content information into a computer book table of contents 944. The computer book table of contents 944 is then provided to a table of contents validation module 946. Similarly, index information from the extract source XML files 940 is extracted using an index extraction module 952. The index extraction module 952 generates a computer book index file 954. The computer book index file 954 is then provided to an index validation module 956.
The output of the table of contents and index validation modules, 946 and 956 respectively, are provided to a rubric matching module 972. The rubric matching module 972 operates on the rubric and body of the book. The rubric matching module 972 matches the book headings, such as chapter, sub-heading, and the like to the corresponding portion of the book body. The rubric matching module 972 can determine, for example, which table of contents line entries correspond to which sections in the book body. In the case of bibliographies, the rubric matching module 972 determines in which rubric a given citation occurs.
The output of the rubric matching module 972 is coupled to a computer book merge module 974. The computer book merge module 974 merges table of contents and index information into a computer book 976. The information in the table of contents and the information in the index are thus made accessible by the database.
The extract source XML file 940 also includes the body of the book. Information from the body of the book is extracted uses a parity reference module 962. The output of the parity reference module 962 is one or more chapter reference XML file 964. The chapter reference XML files 964 are provided to an import module 966. The import module 966 provides the body of the book to the database.
FIG. 10 is a functional block diagram of an embodiment of a journal article import system. The system is configured to import articles for a medical discipline-specific database. Alternative journal article import systems may similarly import journal articles into other discipline-specific databases.
The journal article import system is configured to import articles, such as articles from, for example, National Library of Medicine (NLM) databases, UMI databases, publisher databases, Infotrieve databases, or some other general content or data source. The information may be downloaded directly from the source or may be scraped from a website. For example, National Library of Medicine information may be received from a MedLine Annual Update or may alternatively be derived from a National Library of Medicine website.
The National Library of Medicine annually produces an update of its MedLine database. The MedLine Annual Update is available as a DLT tape or alternatively through FTP Download. The MedLine Annual DLT tape 1002 may be converted one or more times to extract the database information.
For example, an initial database converter 1010 may convert the MedLine Annual DLT tape 1002 to a DAT format 1012. The information in the converted MedLine Annual DAT tape 1012 is then mined using a database selector 1020. The database selector 1020 is configured to select those articles or subsets of the MedLine database that are to be included in the discipline-specific database. The subset of articles selected by the database selector 1020 is then coupled to a database import module 1070. The database import module 1070 parses the data in the subset of articles selected by the database selector and imports the data to the database.
More current articles or recently published articles that are not included in the MedLine Annual Update may be downloaded directly from the National Library of Medicine website. A database scraping module 1030 may connect with the National Library of Medicine website. The database scraping module 1030 may, for example, connect to the PubMed database supported by the National Library of Medicine. The database scraping module 1030 may then scrape the PubMed database to retrieve the relevant journal articles. Scraping refers to the acts of searching, identifying and selecting relevant articles (or other entities). The relevant articles are scraped from the National Library of Medicine PubMed database. The database scraping module 1030 produces a subset of articles that are relevant to the discipline-specific database. The database scraping module 1030 may perform searches, for example, using the keywords from a lexicon entity or ontology entity. Journal articles selected by the database scraping module 1030 are coupled to the database import module 1070.
Information may similarly be downloaded from the Infotrieve database, a general content or data source, or directly from publisher databases. One or more journals or journal articles accessible through Infotrieve or another content source may also be accessible through the National Library of Medicine database. The Infotrieve journal article database information may also be imported directly from Infotrieve or via the Infotrieve website. Alternatively, journal articles may be imported directly from connections to publisher databases or may be downloaded via publisher websites. Journal articles may be imported from any general content or data source.
In one embodiment, data acquisition module 1040 may download information from a general content or data source. The data acquisition module 1040 may, for example, download historical or archival data 1042 from a source database. Blocks of historical or archival information 1042 are then forwarded to an article selector 1050. The article selector 1050 searches, identifies and selects the subset of articles that are relevant to the discipline-specific database. The selected subset of articles is then coupled to the data import module 1070 for importation into the discipline-specific database.
A journal scraping module 1060 may connect with a general content or data source website. The journal scraping module 1060 may periodically search and retrieve relevant articles from the general content or data source website. As was the case with the PubMed scraping module 1030, the journal scraping module 1060 may receive search terms from the lexicon or ontology entities. Journal articles that are identified by the journal scraping module 1060 are forwarded to the database import module.
FIG. 11 is a functional block diagram of an organization import module. The organization import module can accept information electronically through files, through a website or using manual keying.
Organization information may be formatted in an electronic file 1102. Such an electronic file 1102 may, for example, be supplied by the organization in response to a survey or form. Alternatively, a third party may generate the organization electronic file 1102.
The organization electronic file 1102 is provided to an attribute extraction module 1110. The attribute extraction module 1110 extracts the relevant information and generates one or more organization files 1150. Relevant information is that information which is relevant to the discipline-specific database. For example, a university may have one or more departments. However, only one of the departments may be relevant to a specific database.
Similarly, information may be retrieved from an organization's website 1112. A web crawler 1120 or similar robot may access the organization's website 1112 and retrieve information from that website. The web crawler 1112 may deposit all the retrieved information into a temporary organization information file 1122. The temporary organization information file 1122 may, for example, be HTML pages retrieved from the organization website 1112.
The temporary organization information file 1122 is provided to an attribute extraction module 1130. The attribute extraction module 1130 accesses the temporary organization information file 1122 and extracts the relevant database information. The attribute extraction module 1130 then generates one or more organization files 1150 that are relevant to the discipline-specific database.
Alternatively, organization information may be input into the discipline-specific database via manual keying 1140. One or more individuals having knowledge of the organization may generate the one or more organization files 1140 using an Organization Data Management (ODM) interface configured according to the schema described in FIG. 6. The ODM interface can be, for example, implemented in the content aggregation management and staging module shown in FIG. 1. The organization is modeled following the org-entity relationships of parent org and child org to hierarchically build the organization beginning with the main organization, such as a university, followed by one or more discipline relevant child organizations. The ODM interface further provides the opportunity to manually enter people information (1330) as shown in FIG. 13.
The one or more organization files 1150 are provided to a data conversion module 1160. The data conversion module extracts 1160 the entity and attribute information and populates the corresponding tables in the discipline-specific database. The data conversion module 1160 may also transform the organization files into a desired database format, for example, XML. The output of the data conversion module 1160 is provided to a normalization module. The normalization module converts the surface forms from the data conversion module into the equivalent definitive forms.
FIG. 12 is a functional block diagram of one embodiment of a web resource import system. The system searches Internet websites 1202 that have information relevant to the discipline-specific database.
A search engine 1220 having a web crawler 1222 connects to websites 1202 over the Internet. In the first embodiment, the web crawler 1222 successively crawls through Internet websites 1202 and catalogs all websites encountered. A search generator 1210 generates one or more search terms that are input to the search engine 1220. The search generator 1220 can generate search queries using, for example, keywords from the lexicon or ontology entity. The search engine 1220 returns a list of web pages that match the search terms. The search engine 1220 stores the list of matches in the search result catalog 1230.
A data conversion module 1240 accesses the search result catalog 1230 and extracts the information from the web pages. The data conversion module 1240 parses and stores the information from the web pages in appropriate entity tables in the database. The data conversion module 1240 also generates the relationships and relationship attributes linking the information from the websites to other entities. The information output by the data conversion module 1240 is provided to a normalization module.
FIG. 13 is a functional block diagram of one embodiment of a system for the input of person entities. The system is optional in the content aggregation system because the majority of information relating to a person is available through bibliographical sources or web resources.
Data relating to a person may be supplied via electronic files 1302, biographical sources 1312, or via manual keying 1330. An electronic file 1302 having personal information may be generated, for example, by a natural form representative or a third party in response to a survey or questionnaire or upon noting an error in the data. For example, a person using the data base system could note an error and supply the correct information. Further, surveys developed from definitive form entity representations can be used to solicit additional information from natural form representatives with potentially higher response rates and richer data submission than providing blank forms for self description by natural form representatives. Alternatively, electronic files may be generated from manually keyed inputs to other coupled systems, such as sales or marketing representative inputs to a customer relationship management system. The electronic file 1302 is provided to an attribute extraction module 1310. The attribute extraction module 1310 extracts the relevant personal information and generates one or more person files 1340.
Personal information may also be extracted by biographical sources 1312. Biographical sources 1312 can include books, such as who's who books, and industry catalogs of individuals active in the area of interest. The biographical source 1312 is coupled to an attribute extraction module 1320. The attribute extraction module 1320 extracts the relevant biographical information and generates one or more person files 1340.
The person files may alternatively be generated manually by an operator using the ODM interface described in the organization input module of FIG. 11. An operator having knowledge of the personal information, through the ODM process of modeling parent organizations, their one or more child organizations, and members of those organizations can manually key 1330 the data into one or more person files 1340. Alternatively, an operator, or system administrator, can obtain personal information knowledge through other sources and manually input that information using the ODM interface.
When person files are created through the ODM process, the membership relationships between a person entity and an organization entity can be entered manually. For example, the memberof relationship can be manually entered into predetermined fields that the ODM interface provides to an operator entering person information.
The person files 1340 can include one or more tables having the person's name as the record and attributes of that person included in that record. Attributes can include, for example, organizations with which that person is a member or degrees granted to that person. The person files 1340 are provided to a data conversion module 1350 that parses the data and inputs the data into the discipline-specific database. The data conversion module 1350 may also generate surface forms of other entities and the relationships and relationship attributes based on the person files. For example, person files may include bibliographic references to publications authored by a specific person; such bibliographic references could generate surface forms of the document entities and co-author person entities. The output of the data conversion module 1350 is provided to a normalization module.
Each of the foregoing processes of importing information or data into the system also can include the opportunity to add meta data to each entity and/or attribute. One embodiment of meta data has been described above.
FIG. 14A is a functional block diagram of a normalization module. The normalization module of FIG. 14A can be used, for example, in the import processes of FIGS. 9-13. The normalization module is shown as operating on data from book import or journal article import systems. However, the normalization module can also operate on the data provided from other sources such as the organization input, person input, grant input, web resource input modules, or from input provided by natural form representatives.
The book import module, such as the book import module shown in FIG. 9, generates a surface form of the book 1402. Similarly, the journal article import module of FIG. 10 generates a surface form of the article. For example, the journal article import module can generate a surface form of a PubMed reference 1404. Similarly, the journal article import module can generate a surface form of an Infotrieve reference 1406 or a reference imported from a general content or data source.
Each of the surface forms generated by the respective import modules is converted into a common document book format in an auto-conversion module 1410.
A book reference normalizer 1414 accesses the standard document book files and extracts the entity relating to the surface forms of the book. In the case of the book import, the book reference normalizer's task is trivial. The surface form of the book imported in the book import process is the same as the book entity. In the case of document book files generated by the article import process, the book reference normalizer 1414 accesses the bibliography of the articles and maps the surface forms of the book to the book entity 1420.
Similarly, an article reference normalizer 1416 accesses surface forms of articles and maps them to the appropriate article entities. Surface forms of article references may be generated in the article import process. Alternatively, surface forms of articles may be generated in the bibliographies of books or articles, or in lists of publications authored by individuals, for example in a person's CV. The various surface forms are mapped to the actual article entity 1422.
An author or affiliation generator 1412 extracts the author and organization surface forms, 1431 and 1430 respectively, from the document books. The various author (person) surface form entities 1431 can be mapped to the person definitive form entities 1480 using an auto-normalizing module 1433 or a manual normalization process.
The author or affiliation generator 1412 also generates surface forms of affiliations 1430. One or more of the surface form affiliations 1430 may be selected for normalization in a data selector module 1432. The organization normalizer 1434 maps the surface form of the affiliation 1430 to the organization entity 1436.
Additional organization information may be generated by an organization scraping module 1440. The organization scraping module 1440 generates a surface form of the scraped organization 1442. An organization normalizer 1444 normalizes those organization properties generated by the scraping. The scraped organization surface forms 1442 may be mapped back to the original organization entity 1436 or may alternatively be mapped to a detailed organization entity 1446.
The organization scraping module 1440 may also generate scraped person surface forms 1450. The scraped person surface forms 1450 are normalized to the corresponding person definitive form entities 1480 in an auto-person normalization module 1452. A person entity 1480 may have one or more normalized person properties 1490 or attributes. Attributes can obtained by scraping (searching relevant sources) 1482. Those attributes or properties 1484 can them be normalized. The normalization of various person surface forms to a definitive person form can be achieved manually or through an automated process or a combination of both.
The normalization process begins with the auto-creation of a normalization cluster in which a definitive person form is presented as a target, and one or more person surface form(s) that meet selected criteria are included in the cluster for possible normalization. The criteria can include, for example, match to last name and first initial, with either affiliation, e-mail, or website. Additionally, the meta data associated with each of those attributes can also be factored into the criteria.
In one embodiment the normalization process follows an evidence based process of review in which key distinguishing attributes and relationships are evaluated to determine if the surface person form name is a match to the definitive person form. Such attributes can include, but are not limited to, affiliation, e-mail address, author records, self-review by a natural form representative, website information, and the like. In addition the weight attached to each such piece of evidence can be varied by the associated meta data, such as the source and belief meta data. The various distinguishing attributes and relationships are used to normalize the various person surface forms to a canonical representation of the person entity. Based at least in part on the evidence derived from examining the attributes and relationships, or lack thereof, a surface form person can be normalized to a definitive person form, and the normalized attributes 1490 may map the person entity to a more detailed person entity. For example, a web crawler can be used to search the online information describing natural form person entities (for example, available at university website) to obtain lists of new publications by the entity. Such evidence can then be used to normalize a publication.
Another possible outcome when performing a normalization process includes performing no action when there is insufficient evidence to determine if there is a match of the surface form to the definitive form. Still another action that can occur when performing normalization is determining "no match" when the process determines that the surface form or a person does not match the definitive person form.
The book import module may also generate book ISBN entities 1460. The book ISBN entities 1460 are entities as well as surface forms of the book ISBN. Book ISBNs can be obtained, for example, by a scraping module 1462 that performs a scraping operation on a book database, such as the Amazon database.
The book ISBN entity 1460 may have attributes that are surface forms of book authors 1464 and surface forms of the book title 1466. The surface forms of the book author 1464 or of book authors or journal articles that are referenced in the book bibliography are normalized to person definitive form entities 1480 using a book author normalizer 1470. Similarly, the surface form of the book title 1466 is normalized to a detailed book entity 1474 using a book reference normalizer 1472. The functions of the book author normalizer 1470 as well as the book reference normalizer 1472 may be performed automatically, or may alternatively be performed manually.
FIG. 14A shows a normalization module that is configured to perform normalization across different entity types. That is, the normalization module of FIG. 14A can perform normalization of authors, books, and articles, which correspond to person and publication entity types. In another embodiment, normalization of different entity types can be performed in modules adapted for that entity type. For example, a normalization module can be used to normalize organization surface forms to definitive surface forms, and a separate normalization module can be used to normalize surface forms of persons to definitive person forms.
FIG. 14B is a functional block diagram of a normalization module configured to normalize a surface form of a person to a definitive form of the person. The normalization module implements an evidence based process of review as described above in relation to FIG. 14A. A discipline specific database system may incorporate one or more modules similar to the module shown in FIG. 14B. Each of the modules can be adapted to perform normalization of one or more entity types.
The module begins by retrieving a surface form record 14102 and a definitive form record 14110. Each of the records 14102 and 14110 can be, for example, records previously imported into the discipline-specific database by the content aggregation management and staging module 20 of FIG. 1. Additionally, the records 14102 and 14110 can be stored in a location of the database 50 that is not accessible by the staging server 30 or the public server 40 until after the surface form record 14102 has been normalized.
In FIG. 14B, the surface form record 14102 is shown as a surface form record of a person. Similarly, the definitive form record 14110 is shown as a definitive form of a person. However, other normalization modules will compare records corresponding to the particular entity type being normalized. In one embodiment, the definitive form record 14110 corresponds to a record that was previously normalized, or one that was manually entered and designated as the definitive record.
The retrieved records 14102 and 14110 are then provided to a criteria matching module 14120. The criteria matching module 14120 determines the likelihood that the surface form record 14102 corresponds to the definitive form record 14110. The criteria matching module 14120 can use an evidence based process of review. One or more attributes and relationships can be used as evidence to support or eliminate a match between a surface from and a definitive form. Additionally, the meta data associated with each of those attributes can also be factored into the criteria.
In one embodiment, the criteria matching module 14120 can compare the last name and first initial of a surface person record 14102 to the corresponding attributes of the definitive person record 14110. Additionally, the criteria matching module 14120 can determine if an email address, affiliation, or website associated with the surface form record 14102 matches one associated with the definitive form record 14110. As was mentioned above, associated meta data can also be used. For example, an email address may have an associated start and end date when a person has changed employers and therefore, changed email addresses.
As can be seen, the criteria matching module 14120 can be configured to perform any boolean operation with the attributes, relations and associated meta data associated with a definitive form. Of course, although a boolean operation may be advantageous, the criteria matching module 14120 is not limited to performing boolean operations. Additionally, the criteria matching module 14120 can perform one or more comparison operations and determine one or more matching results. The matching results can be equally weighted or can be weighted according to a rank or hierarchy. Thus, a match to a last name may be weighted more heavily than a first name match or an affiliation match.
The criteria matching module 14120 provides the results of the one or more matching determinations to a normalization cluster creation module 14130. The normalization cluster creation module 14130 determines, based at least in part on the results received from the criteria matching module 14120, whether the surface form record 14102 corresponds to the definitive form record 14110. The normalization cluster creation module 14130 can, for example, compare a matching score against one or more predetermined matching thresholds. The normalization cluster creation module 14130 can then determine a link or relationship between a surface form record 14102 and a definitive form record 14110. This effectively creates a link with very high confidence between the definitive form person entity and the definitive form publication entities connected by the normalization of the surface form person entity described in the document record.
The normalization cluster creation module 14130 can determine that the results from the criteria matching module 14120 are inconclusive, and that it is not possible to conclusively determine (as defined by selected criteria) the surface form record 14102 corresponds to the definitive form record 14110. Additionally, there may not be sufficient information to conclusively determine that the surface form record 14102 does not correspond to the definitive form record 14110. In this case, the normalization cluster creation module 14130 performs no action 14140 and the surface form record 14102 remains in the database without a linkage to the definitive form record 14110. In one embodiment, the normalization cluster creation module 14130 may set a flag, attribute, or some other indicator to indicate that the surface form record 14102 has been checked against the definitive form record 14110. The modified surface form record 14102 is then saved in the database 14144.
In one embodiment the saved unresolved surface form entities can be used as a target list of suspected natural forms. That is particularly useful when the unresolved surface forms form a cluster. In other words, if a group of unresolved surface forms appear to indicate the same natural form, and indicate a high enough probability that a common natural form exists and should be represented in the data base, potentially matching natural forms can be sought out, added in the database, normalized into a definitive form and normalized against the cluster of unresolved surface forms.
The normalization cluster creation module 14130 may determine that the surface form record 14102 matches the definitive form record 14110. In this case, the normalization cluster creation module 14130 determines a match 14150. The normalization cluster creation module 14130 may indicate the manner in which the match was determined or the evidence supporting the match. For example, the match may have been determined based on the results from the criteria matching module 14120 or may have been determined and entered manually based on additional research. A match may also have been determined manually by self verification by a natural form representative. That is, in the case of an author, the actual author may be consulted and verify that the surface form of a person derived from an article import is indeed the same person as represented by the definitive form entity. Alternatively, the author may have noticed a mistake in the data and provided a correction. The normalization cluster creation module 14130 may then indicate the match in the surface form record 14102 and the modified surface form record stored in the database 14154.
In another situation, the normalization cluster creation module 14130 can determine that the surface from record 14102 does not correspond to the definitive form record 14110. In this case, the normalization cluster creation module 14130 determines no match 14160. The normalization cluster creation module 14130 may then indicate the lack of match in the surface form record 14102 and the modified surface form record 14102 stored in the database 14164.
The process of matching surface form records 14102 to definitive form records 14110 can be repeated for each definitive form record 14110 in the database. Alternatively, the comparison may be performed until a match has been determined. The normalization module can then repeat the process for all of the surface form records 14102.
FIGS. 15, 16 and 17 are methods of searching that can be implemented, for example, in the public server 40 of FIG. 1. A search engine within the public server 40 can perform the methods shown in the figures. Although the flowcharts represent acts or steps in a particular order, the order of the steps or acts may not be a requirement of the method. Thus, some steps may be performed in an order not shown in the flowchart. Additionally, steps may be modified, omitted, or inserted into the flowcharts.
FIG. 15 is a flowchart of a method of a hierarchy search that may be performed by a search engine. Initially, the search engine assigns a hierarchy 1502 to attributes to be used in the search process. For example, a book entity may include a table of contents, title and index attributes. The search engine may assign a hierarchy to such attributes such as the title has precedence over the table of contents which may have precedence over the index.
Once the search engine has assigned a hierarchy to all possible search attributes, the search engine may receive search queries 1510. The search queries may be entered, for example, by a user using a public client in communication with the public server. The search engine initially compares the search query keywords against the highest hierarchy level. The search engine records the matches of the search query keywords to the highest hierarchy level 1520.
The search engine next moves one level down the hierarchy—from its current level and compares the search query against the records in the next lower hierarchy. The search engine also records the matches in the next lower hierarchy level 1530.
The search engine next proceeds to a decision block 1532 where the search engine verifies that all hierarchy levels have been searched. If all hierarchy levels have not been searched, the search engine loops back to block 1530 and proceeds to the next lower hierarchy level and searches that hierarchy level against the search query.
However, if all hierarchies have been searched, the search engine next ranks the entities retrieved from the search process according to the hierarchy matches 1540. That is, those entities which have matches in the higher levels of the hierarchy are ranked ahead of those entities which have matches in the lower hierarchy levels. The search engine next returns the rank or the search results to the user 1550. For example, the search engine may display the rank ordered search results in a browser running on the public client.
FIG. 16 is an alternate embodiment of a search method that can be run by a search engine. The search method uses an absolute value model and is not based on a hierarchy. The absolute value search method is based in part on the total number of keyword matches and is not based on the hierarchy of the matches.
The method begins when the search engine receives a search query 1602. The search engine may then either simultaneously or sequentially match the keywords in the search query to records in the database. In the method shown in FIG. 16, the search engine runs a simultaneous match.
The search engine records the number of matches of the keywords to index references 1610. Additionally, the search engine records the number of matches of the keywords to table of content entries 1620. Additionally, the search engine records the number of matches of the keywords in the search query to a title 1630. Similarly, the search engine records the number of keyword matches to subheadings 1640 or to reference tables 1650 within the various records.
The search engine next weights the results 1660. The results can be equally weighted or one or more results may be weighted higher than other results. Unequal weighting of the results can effectively result in a hierarchy of the various attributes.
Once the search engine weights the search results 1660, the weighted results are summed 1670. The search engine next ranks the entities 1680 derived for their weighted results based on their weighted sum. The search engine next returns a rank ordered listing 1690 of the search results.
FIG. 17 is a flowchart of another method that can be performed by the search engine. FIG. 17 shows a rank ordered search where the search engine ranks entities according to various attributes. The rank ordered search results returned by the search engine are based in part on the rank of entities in each attribute category.
The search process begins when the search engine receives a search query 1702. The search engine next ranks entities according to various entity attributes. For example, the search engine may rank entities according to matches of the search query keywords with entries within an entity index 1710. Additionally, the search engine may rank entities according to matches to the entity table of contents entries 1720. The search engine may also rank entities by title 1730, subheadings 1840, or reference tables 1750. The search engine will thus create a plurality of rankings according to the various attributes. The search engine next sums the rankings from each of the entity attributes 1760.
The search engine next ranks the entities according to the summed rank 1770. It may be noted that the lower the summed rank, the higher the entity will rank in the overall rank order. Thus, the rank order is established based on the lowest numerical summed ranks. For example, an entity that ranks first in three rank categories will have a summed rank of three for those three categories. Any other entity can at best rank second in each of the categories and thus will have a summed rank of at least six. The search engine next returns the rank ordered list based on the summed rank 1780.
FIG. 18 is a functional block diagram of a discipline-specific database system. The system includes a database 50 having within it one or more discipline specific databases, coupled to a public server 40 that is also coupled to a network 1802. One or more public clients 64 can also be coupled to the network 1802.
The public server 40 can be, for example, a server or personal computer. The public server 40 includes a processor 1830 in communication with memory 1832. Additionally, the processor 1830 may be coupled to a search engine 1810 and a user interface module 1820. The public server 40, via the user interface module 1820 and search engine 1810, is in communication with the database 50.
The public client 64 may also be a personal computer. The public client 64 can include a processor 1870 coupled to memory 1872. Additionally, the public client 64 can include a hardware interface 1860 coupled to the processor 1870. The public client 64 may also include a browser 1850 and a display 1840 that are coupled to the processor 1870. The public client 64 can access the public server 40 via a network connection.
Typically, a user using the public client 64 can access the database 50 using a browser 1850 and the hardware interface 1860 of the public client 64. The public client 64 via the browser 1850 can access the user interface 1820 in the public server 40 in order to access and search the database 50. Alternatively, the functionality of the server 40 can be implemented on the public client which has direct access to the database 50.
FIG. 19 is a screen shot of a search page 1900 that may be shown in the display of a public client when connected to the public server 40. The search entry page 1900 includes a search entry window 1902 or block. Although any key terms may be entered in the search window 1902, only those terms that appear within the discipline-specific database will be returned. For example, the search page 1900 shows the search page associated with a communicative disorders discipline-specific database. Any search can be entered in the search window 1902, however, only those results relating to communicative disorders will appear in the rank ordered list. In this example, the keyword search "auditory processing" is entered in the search window 1902.
FIG. 20 is a screen shot of an embodiment of a search results page 2000. Rank ordered search results are provided for one or more categories. The rank ordered search results are returned and categorized in tabbed lists 2002-2014. The tabbed lists 2002-2014 loosely correspond to the entity types in the data model. For example, the tabbed lists 2002-2014 loosely correspond to the person, organization and publication entity types.
The tabs shown in FIG. 20 include a tab for books 2002, articles 2004, dissertations 2006, authors 2008, institutions 2010, web resources 2012 and grants 2014. A user may select each one of the tabs in order to display a rank ordered list of search results corresponding to that tab.
Additionally, the results page 2000 may show a listing of related topics 2020 or related terms 2030. The related topics 2020 and related terms 2030 may, for example, result from searches through the ontology or lexicon entities. Thus, a user that is not familiar with the lexicon of the particular discipline may be prompted using the related terms.
FIG. 21 is a screen shot of an embodiment of a detailed book listing 2100. The detailed book listing appears when a dynamic link identified by the book title is selected from the search results page 2000. The detailed book listing 2100 includes a detail display portion 2110 that includes details derived from the book, such as table of contents information. The detailed book listing 2100 also can include author and book summary information in a summary display portion 2120. The summary information can display the author's name as a dynamic link 2122. Selecting the author name dynamic link results in detailed author information to be displayed.
FIG. 22 is a screen shot of an embodiment of the author list display 2200 that results when the selected authors tab 2008 is selected. In this embodiment, the list of authors is provided alphabetically. However, in alternative embodiments, the list of authors may be provided in a rank order. The rank order may be established based on the rank order of one or more of the other tabbed lists. For example, the rank order of authors may be ordered based on the rank order of books in the books tab, or may be ordered by a weighted composition of the rank order or publication score across one or more tabs. Each author is shown as a dynamic link. Highlighting and selecting the author links the display to an expansion of the author. Alternatively, for key word to person searching, the rank ordering can be based on a set of indexes created for each person (definintive and or surface form entities) by aggregating information in associated documents across those documents.
FIG. 23 is an embodiment of a screen shot of an expanded author listing 2300. The expanded author listing 2300 shown in FIG. 23 represents the author listing when the first author listed in the author list 2200 is selected. The expanded author listing 2300 provides the name of the author, the degrees granted to the author and selected publications 2310. The selected publications 2310 may include journal articles 2322, books 2312, grants and dissertations. Additionally, the selected publications 2310 may be limited to those publications that may be categorized within the discipline-specific database. Thus, articles and books that are authored by the selected author that do not fall within the discipline-specific database may or may not be shown in the selected publications. Additionally, publications with insufficient information to support normalization of a surface form author entity to the definitive form person entity may be represented within a separately identified section of the expanded author listing, such as "also authored by [first initial] [last name]".
FIG. 24 represents an embodiment of a screen shot 2400 of the results page when the articles tab 2004 is selected. As with the other results in the results page, the articles page 2400 may only show those articles that return discipline-specific information. Each article, for example 2444 listed in the rank ordered list is shown as a dynamic link to another expanded view of the article. Additionally, a link is provided to either download or purchase the article.
FIG. 25 is an embodiment of a screen shot of an expanded article page 2500 that appears when the first article 2444 listed in the articles tab is selected. The expanded article view shows the bibliographic information related to the highlighted article. Additionally, the screen shows the ability to save the article in a folder or export the article.
FIG. 26 is an embodiment of a screen shot 2600 of a rank ordered list of dissertations that appear when the dissertations tab 2006 is selected. Each dissertation, for example 2644, is shown as a dynamic link to an expanded view page.
FIG. 27 is an embodiment of a screen shot 2700 of the expanded view of a dissertation 2644 that is selected from the dissertation list of FIG. 26. The expanded listing shows standard bibliographic entries and also includes the abstract 2730. The expanded view also includes one or more dynamic links, for example 2722. Here, the author 2722 is shown as a dynamic link. Selecting the author will transfer the user to a separate page that identifies the expanded view of the author.
One or more of the search results may be saved in a user-defined folder for future reference. FIG. 28 shows a screen shot 2800 of the contents of a folder 2812 that was generated by selecting results from the rank ordered lists in the search results tab. The user is also provided the opportunity edit the folder 2840 by, for example removing selected items from the folder or exporting items from the folder to another folder or article. Additionally, a share folder item 2830 allows the user to generate a web page to share the search results stored within that folder with those that do not have access to the discipline-specific database.
As shown in the user interface screen shot 2800 of FIG. 28, the discipline-specific reference database system allows a user to store selected search results in a user defined folder. The system can also be configured to generate a web page, such as an Internet accessible web page, that can be shared with others that do not have access to the reference database system. FIG. 29 is a functional block diagram of a shared results system based on the discipline-specific database system shown in FIGS. 1 and 18.
The user shown in FIG. 29 is provided as an example of one with access to the discipline-specific reference database system. The colleague in FIG. 29 is shown as one that may or may not have access to the discipline-specific reference database system. The user and colleague represent end users of the save and share system and do not form a part of the save and share system.
The user accesses a reference search system and user interface 2910 to search for information. The reference search system and user interface 2910 can be, for example, the discipline-specific database system shown in FIGS. 1 and 18. For example, the user may access the user interface 1820 provided in the public server 40 of FIG. 18. The user may access the public server 40 via a public client 64 as shown in FIG. 18.
The reference search system and user interface 2910 receives one or more search queries from the user. The reference search system and user interface 2910 can then search an electronic reference database 2950 for information satisfying the queries. For example, in the system of FIG. 18, the public client 64 receives a query and transmits the query across the network 1802 to the user interface 1820 in the public server 40. A search engine 1810 in the public server 40 accesses an electronic database 50 and retrieves one or more entries matching the query. The user interface 1823 then presents the query results to the user. The user can access the query results, for example, using the browser 1850 in the public client 64.
The results can be displayed to the user in one or more linked web pages, as shown in FIGS. 20-27. The search results generated by the reference search system and user interface 2910 can be linked to a folder management system and user interface 2920. The folder management system and user interface 2920 can be, for example, part of the user interface 1820 in the public server 40 of FIG. 18.
The folder management system and user interface 2920 can be configured to allow the user to manage user defined folders. The user defined folders can be stored in a folder and stored reference database 2955. The folder and stored reference database 2955 can be one or more storage modules that are separate and distinct from the electronic reference database 2950. Alternatively, the folder and stored reference database 2955 can share one or more storage modules with the electronic reference database 2950.
As shown in the screen shot of FIG. 28, a user can manage one or more folders within a user folder 2810, labeled in FIG. 28 as 'My Folders.' The user can create one or more results folders 2812 within the user folder 2810. As shown in FIG. 28, the user has created a results folder 2812 labeled 'Test'. The folder management system and user interface 2920 can receive one or more reference selections to add to the results folder, for example 2812.
The folder management system and user interface 2920 can, for example, provide a check box in the various search results pages. A user can select a reference for inclusion into a results folder by highlighting the check box associated with the reference. For example, as shown in the book results screen shot 2000 of FIG. 20, one or more of the book search results is associated with a check box that can be used to select a book. For example, the check box 2042 can be highlighted to indicate that book reference number 1 to be saved in a user folder. Similarly, the author screen shot 2200 of FIG. 22 shows check boxes associated with authors. A user can highlight the check box, for example 2242, to indicate the corresponding author information, for example 2244, is selected for inclusion in the user folder.
The folder management system and user interface 2920 can thus receive one or more reference selections to add to the results folder and can receive a command to add the selected results to the user folder. For example, in the screen shot 2000 of FIG. 20, the user can command the system to save selected references in the user folder by selecting a 'save' command button 2040 on the user interface. In response to the user command, the folder management system and user interface 2920 saves the selected data in the folder and stored reference database 2955.
The user can also annotate the stored results. The folder management system and user interface 2920 can receive one or more annotations that are stored in the folder and stored reference database 2955. The annotations can be, for example, associated with selected database results or may be annotations that are independent of any database result.
The user can direct the folder management system and user interface 2920 to generate a web page showing the selected search results contained within a results folder. The folder management system and user interface 2920 receives a command to generate a web page for a specific user folder. As shown in the user interface screen shot of FIG. 28, a user can, for example select a 'share folder on the web' 2830 button to command the system to generate a web page. In the embodiment shown in FIG. 28, the button 2830 appears in the same interface page that displays the folder contents. Other embodiments can implement other command input interfaces.
In response to receiving the command to generate the web page, the folder management system and user interface 2920 generates a web page with the information stored within the selected folder. The web page can include dynamic links relating the various stored data items and can include user annotations. The web page can also be stored in the folder and stored reference database 2955 or can be stored in some other storage module (not shown).
The folder management system and user interface 2920 is in communication with a published web page server 2925. The published web page server 2925 can be, for example, an Internet accessible server such as a computer. The published web page server 2925 can access the web pages generated by the folder management system and user interface 2920 and provide access over a network connection. For example, the published web page server 2925 can provide access to, or publish, the web pages at predetermined Internet addresses or URLs.
Once the user has directed the folder management system and user interface 2920 to generate a web page, the user may inform a colleague of the search results. The user can send, for example and e-mail message containing the URL of the web page to the colleague.
An email system and user interface 2930 can receive instructions directing such an email message be generated and sent. For example, the email system and user interface 2930 can allow a user to select one or more user folders stored in the folder and stored reference database 2955. The email system and user interface 2930 can also receive one or more destination e-mail addresses. The email system and user interface 2930 can then generate an email message containing, for example, the URL corresponding to each of the selected user folders. The email system and user interface 2930 can also send the email messages to the desired destination addresses.
FIG. 30 is a flowchart of a result sharing process that can be performed by the system shown in FIG. 29. Initially, a user accesses a reference database system and creates a user folder 3010. The user folder can be stored as a customizable electronic storage folder. As shown in FIG. 29, the folder management system and user interface can generate a user folder in response to user commands.
The user can then add one or more references 3020 to the user folder. The references can be identified in the same search query or search session or can be identified from different search queries and search sessions. For example, the user can search a discipline specific reference database and identify one or more search results to be added to the user folder. The selected search results can be stored in a selected customizable electronic storage folder.
The user can access the customizable electronic storage folders to view the contents, edit the contents, or annotate the contents 3030. References can be added or removed from the user folder. Additionally, the user can annotate one or more of the items stored in the user folder. Other user annotations may refer generally to the contents of the user folder. For example, general annotations can include identifying one or more search queries used to obtain the results, the dates of the searches, and suggested additional searches.
The user can then publish the contents of a selected user folder 3040. For example, the user can command the reference database system to generate a web page containing the contents of the selected user folder. Alternatively, a spreadsheet, email message, text document, and the like, or some other publication format can be used.
Once the user publishes the contents of the folder, the user can inform one or more colleagues of the availability of the data. For example, the user can send to a colleague a URL corresponding to a web page containing the search results. The user can send, for example, an email message to the colleague containing the URL. Alternatively, the user can generate and send a phone message, paging message, text message, or some other message identifying the location of the published results.
Thus, one or more embodiments of a searchable, navigatable, or publishable database that produces results that can allow for discipline-specific searching which can be transparent to a type of reference source and can allow for navigation to, from, or between database elements and methods for creating the same are disclosed. The various database system and method embodiments can be based on one or more logical data models that can be implemented using one or more modules. The modules can import, parse, and link various discipline-specific data to allow a researcher to perform a focused search of data that is relevant to one or more disciplines or fields of discourse.
The various modules and processes detailed in the figures and descriptions can be modified to omit certain functions and include other functions in other embodiments. Additionally, the various modules and processes need not necessarily be performed in the order shown or discussed, and the order may typically be modified unless order is logically required. For example, normalization logically occurs after import of data. However, the order in which data is imported or the order in which imported data is normalized can be modified as a matter of design.
Couplings and connections have been described with respect to various devices, modules, or elements. The connections and couplings can be direct or indirect. A connection between a first and second module can be a direct connection or can be an indirect connection. An indirect connection can include interposed elements that can process the signals from the first device to the second device.
Those of skill will further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled persons can implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein can be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium. An exemplary storage medium can be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium can be integral to the processor. The processor and the storage medium can reside in an ASIC.
The above description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein can be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
1. A database creation system for representing natural form entities, the system comprising:
an import module configured to receive input electronic data relating to natural form entities and to convert the electronic data into surface form entities wherein each surface form entity represents one natural form entity and wherein one natural form entity can have more than one corresponding surface form entity; and
a normalization module configured to receive surface form entities and convert them to definitive form entities when the information contained within the surface form meets selected criteria, wherein each definitive form entity corresponds to a single natural form entity and there is only one definitive form entity for any one natural form entity and wherein definitive form entities include information regarding relationships to other definitive form entities.
2. The system of claim 1, wherein the normalization module is further configured to merge multiple surface form entities that represent the same natural form entity into a single definitive form entity.
3. The system of claim 2, further comprising a publication module configured to receive definitive form entities from said normalization module and to form an index.
4. The system of claim 3, wherein said publication module is further configured to remove selected portions of data from said definitive form entities.
5. A method of creating a database for representing natural form entities, the method comprising:
receiving electronic data relating to natural form entities;
converting the electronic data into surface form entities, each surface form entity having attributes that characterize the natural form entity which the surface entity represents, wherein each surface form entity represents one natural form entity and wherein one natural form entity can have more than one corresponding surface form entity; and
converting a surface form entity to a definitive form entity when the attributes of the surface form entity meet selected criteria, wherein each definitive form entity corresponds to a single natural form entity and there is only one definitive form entity for any one natural form entity.
6. The method of claim 5 further comprising merging multiple surface form entities that represent the same natural form entity into a single definitive form entity.
7. The method of claim 6, further comprising creating an index from the attributes of the definitive form entities.
8. The method of claim 7 further comprising removing selected portions of data from said definitive form entities.
9. The method of claim 7, wherein definitive form entities include information regarding relationships to other definitive form entities
10. The method of claim 9, wherein natural form entities include persons and publications.
11. The method of claim 10 wherein creating the index includes associating person definitive form entities with key words from publication definitive form entities related to the person definitive form entities.
12. The method of claim 5 further comprising associating meta data with selected attributes of surface form entities, wherein the meta data includes information about the associated attribute.
13. The method of claim 12 wherein the meta data includes information selected from the start and end date of the associated attribute, the date of occurrence of the associated attribute, the source of the evidence of the existence of the associated attribute and the believability of that source.
14. A database creation system for representing natural form entities comprising:
an import module configured to receive input electronic data relating to publications and persons and to convert the electronic data into surface form entities wherein each surface form entity represents one person or publication and represents association between person surface form entities and publication surface form entities and wherein one person or publication can have more than one corresponding surface form entity;
a normalization module configured to receive surface form entities and convert them to definitive form entities when the information contained within the surface form meets selected criteria, wherein each definitive form entity corresponds to a person or publication and there is only one definitive form entity for any one person or publication; and
a publication module configured to create an index from the definitive form entities wherein each person definitive form entity has an associated collection of publication definitive form entities such that searching can be performed upon the publication definitive form entities associated with a person definitive form entity.
15. A method of creating a database for representing natural form entities, the method comprising:
receiving electronic data relating to publications and persons;
converting the electronic data into surface form entities in the database, wherein each surface form entity represents one person or one publication, each surface form entity includes attributes that characterize the natural form entity which the surface entity represents, with one attribute being the relationship of authorship between a person and a publication, and one person or publication can have more than one corresponding surface form entity;
converting surface form entities to definitive form entities when the attributes of the surface form meets selected criteria, wherein each definitive form entity corresponds to a person or publication and there is only one definitive form entity for any one person or publication; and
creating an index from the definitive form entities wherein each person definitive form entity has an associated collection of publication definitive form entities such that searching can be performed upon the publication definitive form entities associated with a person definitive form entity.
US10/994,189 2003-11-20 2004-11-19 Systems and methods for creating and publishing relational data bases Abandoned US20050149538A1 (en)
US10/994,189 US20050149538A1 (en) 2003-11-20 2004-11-19 Systems and methods for creating and publishing relational data bases
US10/994,189 Abandoned US20050149538A1 (en) 2003-11-20 2004-11-19 Systems and methods for creating and publishing relational data bases
US (1) US20050149538A1 (en)
US20040163033A1 (en) * 2002-07-25 2004-08-19 Wolfe Gene J. Document preservation
US20050262050A1 (en) * 2004-05-07 2005-11-24 International Business Machines Corporation System, method and service for ranking search results using a modular scoring system
US20060036585A1 (en) * 2004-02-15 2006-02-16 King Martin T Publishing techniques for adding value to a rendered document
US20060106847A1 (en) * 2004-05-04 2006-05-18 Boston Consulting Group, Inc. Method and apparatus for selecting, analyzing, and visualizing related database records as a network
US20060179027A1 (en) * 2005-02-04 2006-08-10 Bechtel Michael E Knowledge discovery tool relationship generation
US20060200772A1 (en) * 2003-12-08 2006-09-07 Sathiyamoorthy Dhanapal Procedural computation engine for providing complex calculated data results to an object-oriented server system accessible to service clients and agents over a data packet network
US20060230340A1 (en) * 2005-04-06 2006-10-12 Marcella Betz Parsons System and method for publishing, distributing, and reading electronic interactive books
US20060236228A1 (en) * 2005-04-19 2006-10-19 Microsoft Corporation Extensible markup language schemas for bibliographies and citations
WO2006113538A2 (en) * 2005-04-19 2006-10-26 Microsoft Corporation Determining fields for presentable files and extensible markup language schemas for bibliographies and citations
US20070100870A1 (en) * 2005-11-03 2007-05-03 Jenkins Jana H Enabling a user to create a mini information center thereby reducing the time needed for the user to obtain the desired information
WO2008054750A2 (en) * 2006-10-30 2008-05-08 Credit Suisse Securities (Usa) Llc Generating documentation and approvals for entities and transactions
US20080115082A1 (en) * 2006-11-13 2008-05-15 Simmons Hillery D Knowledge discovery system
US20080147590A1 (en) * 2005-02-04 2008-06-19 Accenture Global Services Gmbh Knowledge discovery tool extraction and integration
US20080244429A1 (en) * 2007-03-30 2008-10-02 Tyron Jerrod Stading System and method of presenting search results
US20080243785A1 (en) * 2007-03-30 2008-10-02 Tyron Jerrod Stading System and methods of searching data sources
US20080265014A1 (en) * 2007-04-30 2008-10-30 Bank Of America Corporation Credit Relationship Management
US20080281841A1 (en) * 2003-09-12 2008-11-13 Kishore Swaminathan Navigating a software project respository
US20090037464A1 (en) * 2004-10-06 2009-02-05 Hewlett-Packard Development Company, L.P. Proving Relationships Between Data
US20090164438A1 (en) * 2007-12-19 2009-06-25 California Institute Of Technology Managing and conducting on-line scholarly journal clubs
US20090171691A1 (en) * 2007-12-28 2009-07-02 Humanbook, Inc. System and method for a web-based social networking database
US20090171979A1 (en) * 2007-12-28 2009-07-02 Humanbook, Inc. System and method for a web-based address book
US20090182723A1 (en) * 2008-01-10 2009-07-16 Microsoft Corporation Ranking search results using author extraction
US20100005411A1 (en) * 2008-07-02 2010-01-07 Icharts, Inc. Creation, sharing and embedding of interactive charts
US20100023539A1 (en) * 2008-07-25 2010-01-28 International Business Machines Corporation Xml/database/xml layer analysis
US20100037161A1 (en) * 2008-08-11 2010-02-11 Innography, Inc. System and method of applying globally unique identifiers to relate distributed data sources
US20100106707A1 (en) * 2008-10-29 2010-04-29 International Business Machines Corporation Indexing and searching according to attributes of a person
US20100131566A1 (en) * 2008-11-26 2010-05-27 Canon Kabushiki Kaisha Information processing method, information processing apparatus, and storage medium
US20100174748A1 (en) * 2004-11-12 2010-07-08 Kurt Strumpf Managing Media Contact and Content Data
US20100179969A1 (en) * 2008-03-27 2010-07-15 Alcatel-Lucent Via The Electronic Patent Assignment Systems (Epas) Device and method for automatically generating ontologies from term definitions contained into a dictionary
US7812860B2 (en) 2004-04-01 2010-10-12 Exbiblio B.V. Handheld device for capturing text from both a document printed on paper and a document displayed on a dynamic display device
US20100262552A1 (en) * 2007-03-11 2010-10-14 Valentina Pulnikova System and method of global electronic job market in the Internet
US20100325101A1 (en) * 2009-06-19 2010-12-23 Beal Alexander M Marketing asset exchange
US20110137705A1 (en) * 2009-12-09 2011-06-09 Rage Frameworks, Inc., Method and system for automated content analysis for a business organization
US7990556B2 (en) 2004-12-03 2011-08-02 Google Inc. Association of a portable scanner with input/output and storage devices
US8081849B2 (en) 2004-12-03 2011-12-20 Google Inc. Portable scanning and memory device
WO2012024028A1 (en) * 2010-08-18 2012-02-23 Youwho, Inc. Systems and methods for extracting pedigree and family relationship information from documents
US8179563B2 (en) 2004-08-23 2012-05-15 Google Inc. Portable scanning device
US8261094B2 (en) 2004-04-19 2012-09-04 Google Inc. Secure data gathering from rendered documents
US8346620B2 (en) 2004-07-19 2013-01-01 Google Inc. Automatic modification of web pages
US8418055B2 (en) 2009-02-18 2013-04-09 Google Inc. Identifying a document by performing spectral analysis on the contents of the document
US8442331B2 (en) 2004-02-15 2013-05-14 Google Inc. Capturing text from rendered documents using supplemental information
US8447066B2 (en) 2009-03-12 2013-05-21 Google Inc. Performing actions based on capturing information from rendered documents, such as documents under copyright
US8489624B2 (en) 2004-05-17 2013-07-16 Google, Inc. Processing techniques for text capture from a rendered document
US8505090B2 (en) 2004-04-01 2013-08-06 Google Inc. Archive of text captures from rendered documents
US8600196B2 (en) 2006-09-08 2013-12-03 Google Inc. Optical scanners, such as hand-held optical scanners
US8620083B2 (en) 2004-12-03 2013-12-31 Google Inc. Method and system for character recognition
US20140095466A1 (en) * 2008-12-29 2014-04-03 Accenture Global Services Limited Entity assessment and ranking
US20140099038A1 (en) * 2012-10-04 2014-04-10 Fuji Xerox Co., Ltd. Information processing apparatus, information processing method, and non-transitory computer readable medium
US8713418B2 (en) 2004-04-12 2014-04-29 Google Inc. Adding value to a rendered document
US20140122234A1 (en) * 2012-10-31 2014-05-01 Gideon Wald Entity based advertisement targeting
US20140172832A1 (en) * 2012-12-18 2014-06-19 Jason E. Rollins Mobile-Enabled Systems and Processes For Intelligent Research Platform
US8781228B2 (en) 2004-04-01 2014-07-15 Google Inc. Triggering actions in response to optically or acoustically capturing keywords from a rendered document
US8874504B2 (en) 2004-12-03 2014-10-28 Google Inc. Processing techniques for visual capture data from a rendered document
US8892495B2 (en) 1991-12-23 2014-11-18 Blanding Hovenweep, Llc Adaptive pattern recognition based controller apparatus and method and human-interface therefore
US8990235B2 (en) 2009-03-12 2015-03-24 Google Inc. Automatically providing content associated with captured information, such as information captured in real-time
US20150117721A1 (en) * 2013-10-28 2015-04-30 Rocaton Investment Advisors, LLC Coordinate-Based Document Processing and Data Entry System and Method
US9081799B2 (en) 2009-12-04 2015-07-14 Google Inc. Using gestalt information to identify locations in printed information
US20150248382A1 (en) * 2012-11-12 2015-09-03 Korea Institute Of Science 7 Technology Information Apparatus and method for converting an electronic form
US20150254308A1 (en) * 2014-03-10 2015-09-10 Zephyr Health, Inc. Record linkage algorithm for multi-structured data
US9143638B2 (en) 2004-04-01 2015-09-22 Google Inc. Data capture from rendered documents using handheld device
US20150286747A1 (en) * 2014-04-02 2015-10-08 Microsoft Corporation Entity and attribute resolution in conversational applications
US9268852B2 (en) 2004-02-15 2016-02-23 Google Inc. Search engines and systems with handheld document data capture devices
US9323784B2 (en) 2009-12-09 2016-04-26 Google Inc. Image search using text-based elements within the contents of images
US9535563B2 (en) 1999-02-01 2017-01-03 Blanding Hovenweep, Llc Internet appliance system and method
US20170004200A1 (en) * 2015-06-30 2017-01-05 Researchgate Gmbh Author disambiguation and publication assignment
US20170004198A1 (en) * 2015-06-30 2017-01-05 ResearchGate Corporation Author disambiguation and publication assignment
US9665654B2 (en) 2015-04-30 2017-05-30 Icharts, Inc. Secure connections in an interactive analytic visualization infrastructure
US10007729B1 (en) * 2009-01-23 2018-06-26 Zakta, LLC Collaboratively finding, organizing and/or accessing information
WO2018140883A1 (en) * 2017-01-30 2018-08-02 Song Seokkue Systems and methods for enhanced online research
US10157218B2 (en) 2015-06-30 2018-12-18 Researchgate Gmbh Author disambiguation and publication assignment
US10191982B1 (en) * 2009-01-23 2019-01-29 Zakata, LLC Topical search portal
US10482513B1 (en) 2003-09-02 2019-11-19 Vinimaya, Llc Methods and systems for integrating procurement systems with electronic catalogs
US10528612B2 (en) * 2017-02-21 2020-01-07 International Business Machines Corporation Processing request documents
US10528574B2 (en) 2009-01-23 2020-01-07 Zakta, LLC Topical trust network
US10643178B1 (en) * 2017-06-16 2020-05-05 Coupa Software Incorporated Asynchronous real-time procurement system
US10861069B2 (en) 2010-12-02 2020-12-08 Coupa Software Incorporated Methods and systems to maintain, check, report, and audit contract and historical pricing in electronic procurement
US10878016B2 (en) 2015-12-29 2020-12-29 The Boston Consulting Group, Inc Methods of providing network graphical representation of database records
US6182062B1 (en) * 1986-03-26 2001-01-30 Hitachi, Ltd. Knowledge based information retrieval system
US6714939B2 (en) * 2001-01-08 2004-03-30 Softface, Inc. Creation of structured data from plain text
US20040133581A1 (en) * 2002-05-21 2004-07-08 High-Speed Engineering Laboratory, Inc. Database management system, data structure generating method for database management system, and storage medium therefor
US20050228815A1 (en) * 2004-03-31 2005-10-13 Dictaphone Corporation Categorization of information using natural language processing and predefined templates
US7013300B1 (en) * 1999-08-03 2006-03-14 Taylor David C Locating, filtering, matching macro-context from indexed database for searching context where micro-context relevant to textual input by user
2004-11-19 US US10/994,189 patent/US20050149538A1/en not_active Abandoned
US20070083487A1 (en) * 2002-07-25 2007-04-12 Wolfe Gene J Document preservation
US7171433B2 (en) * 2002-07-25 2007-01-30 Wolfe Gene J Document preservation
US7853556B2 (en) 2003-09-12 2010-12-14 Accenture Global Services Limited Navigating a software project respository
US8515816B2 (en) 2004-02-15 2013-08-20 Google Inc. Aggregate analysis of text captures performed by multiple users from rendered documents
US8005720B2 (en) 2004-02-15 2011-08-23 Google Inc. Applying scanned information to identify content
US20060294094A1 (en) * 2004-02-15 2006-12-28 King Martin T Processing techniques for text capture from a rendered document
US7831912B2 (en) * 2004-02-15 2010-11-09 Exbiblio B. V. Publishing techniques for adding value to a rendered document
US20060119900A1 (en) * 2004-02-15 2006-06-08 King Martin T Applying scanned information to identify content
US7702624B2 (en) 2004-02-15 2010-04-20 Exbiblio, B.V. Processing techniques for visual capture data from a rendered document
US8214387B2 (en) 2004-02-15 2012-07-03 Google Inc. Document enhancement system and method
US20060087683A1 (en) * 2004-02-15 2006-04-27 King Martin T Methods, systems and computer program products for data gathering in a digital and hard copy document environment
US8831365B2 (en) 2004-02-15 2014-09-09 Google Inc. Capturing text from rendered documents using supplement information
US7707039B2 (en) 2004-02-15 2010-04-27 Exbiblio B.V. Automatic modification of web pages
US7742953B2 (en) 2004-02-15 2010-06-22 Exbiblio B.V. Adding information or functionality to a rendered document via association with an electronic counterpart
US7818215B2 (en) 2004-02-15 2010-10-19 Exbiblio, B.V. Processing techniques for text capture from a rendered document
US20100106752A1 (en) * 2004-05-04 2010-04-29 The Boston Consulting Group, Inc. Method and apparatus for selecting, analyzing, and visualizing related database records as a network
US7672950B2 (en) * 2004-05-04 2010-03-02 The Boston Consulting Group, Inc. Method and apparatus for selecting, analyzing, and visualizing related database records as a network
US9262514B2 (en) * 2004-05-04 2016-02-16 Ralph W. Eckardt, III Method for providing a network graphical representation of database records
US7257577B2 (en) * 2004-05-07 2007-08-14 International Business Machines Corporation System, method and service for ranking search results using a modular scoring system
US8799099B2 (en) 2004-05-17 2014-08-05 Google Inc. Processing techniques for text capture from a rendered document
US7685125B2 (en) * 2004-10-06 2010-03-23 Hewlett-Packard Development Company, L.P. Proving relationships between data
US8374996B2 (en) * 2004-11-12 2013-02-12 Enr Services Inc. Managing media contact and content data
US7904411B2 (en) * 2005-02-04 2011-03-08 Accenture Global Services Limited Knowledge discovery tool relationship generation
US8356036B2 (en) * 2005-02-04 2013-01-15 Accenture Global Services Knowledge discovery tool extraction and integration
US8660977B2 (en) 2005-02-04 2014-02-25 Accenture Global Services Limited Knowledge discovery tool relationship generation
US7631013B2 (en) * 2005-04-06 2009-12-08 Sierra Interactive Systems, Inc. System and method for publishing, distributing, and reading electronic interactive books
WO2006113538A3 (en) * 2005-04-19 2009-05-07 Microsoft Corp Determining fields for presentable files and extensible markup language schemas for bibliographies and citations
US8086954B2 (en) 2005-04-19 2011-12-27 Microsoft Corporation Programmable object models for bibliographies and citations
US7818668B2 (en) 2005-04-19 2010-10-19 Microsoft Corporation Determining fields for presentable files
US7734613B2 (en) * 2005-11-03 2010-06-08 International Business Machines Corporation Enabling a user to create a mini information center thereby reducing the time needed for the user to obtain the desired information
US20080208655A1 (en) * 2006-10-30 2008-08-28 Credit Suisse Securities (Usa) Llc Method and system for generating documentation and approvals for entities and transactions and generating current and historical reporting related thereto
WO2008054750A3 (en) * 2006-10-30 2008-07-24 Bret Cohen Generating documentation and approvals for entities and transactions
US20100293125A1 (en) * 2006-11-13 2010-11-18 Simmons Hillery D Knowledge discovery system with user interactive analysis view for analyzing and generating relationships
US7765176B2 (en) 2006-11-13 2010-07-27 Accenture Global Services Gmbh Knowledge discovery system with user interactive analysis view for analyzing and generating relationships
US7953687B2 (en) 2006-11-13 2011-05-31 Accenture Global Services Limited Knowledge discovery system with user interactive analysis view for analyzing and generating relationships
US8176440B2 (en) * 2007-03-30 2012-05-08 Silicon Laboratories, Inc. System and method of presenting search results
US8583592B2 (en) * 2007-03-30 2013-11-12 Innography, Inc. System and methods of searching data sources
US20090187569A1 (en) * 2007-12-28 2009-07-23 Humanbook, Inc. System and method for a web- based people picture directory
US20090171690A1 (en) * 2007-12-28 2009-07-02 Humanbook, Inc. System and method for a web-based people directory
US9979758B2 (en) * 2008-07-02 2018-05-22 Icharts, Inc. Creation, sharing and embedding of interactive charts
US20150237085A1 (en) * 2008-07-02 2015-08-20 iCharts. Inc. Creation, sharing and embedding of interactive charts
US8165999B2 (en) * 2008-07-25 2012-04-24 International Business Machines Corporation XML/database/XML layer analysis
US9727628B2 (en) * 2008-08-11 2017-08-08 Innography, Inc. System and method of applying globally unique identifiers to relate distributed data sources
US9342594B2 (en) * 2008-10-29 2016-05-17 International Business Machines Corporation Indexing and searching according to attributes of a person
US8638363B2 (en) 2009-02-18 2014-01-28 Google Inc. Automatically capturing information, such as capturing information using a document-aware device
US8670618B2 (en) 2010-08-18 2014-03-11 Youwho, Inc. Systems and methods for extracting pedigree and family relationship information from documents
US9465986B2 (en) * 2012-10-04 2016-10-11 Fuji Xerox Co., Ltd. Information processing apparatus, method, and non-transitory computer readable medium for creating electronic bookmarked information
US9690807B2 (en) * 2012-12-18 2017-06-27 Thomson Reuter's Global Resources (Trgr) Mobile-enabled systems and processes for intelligent research platform
US9740995B2 (en) * 2013-10-28 2017-08-22 Morningstar, Inc. Coordinate-based document processing and data entry system and method
US9805081B2 (en) * 2014-03-10 2017-10-31 Zephyr Health, Inc. Record linkage algorithm for multi-structured data
US9892208B2 (en) * 2014-04-02 2018-02-13 Microsoft Technology Licensing, Llc Entity and attribute resolution in conversational applications
US9928291B2 (en) * 2015-06-30 2018-03-27 Researchgate Gmbh Author disambiguation and publication assignment
US10133807B2 (en) * 2015-06-30 2018-11-20 Researchgate Gmbh Author disambiguation and publication assignment
Baca 2016 Introduction to metadata
Vandenbussche et al. 2017 Linked Open Vocabularies (LOV): a gateway to reusable semantic vocabularies on the Web
Färber et al. 2018 Linked data quality of dbpedia, freebase, opencyc, wikidata, and yago
Lehmann et al. 2015 DBpedia–a large-scale, multilingual knowledge base extracted from Wikipedia
US10740304B2 (en) 2020-08-11 Data virtualization across heterogeneous formats
US9244952B2 (en) 2016-01-26 Editable and searchable markup pages automatically populated through user query monitoring
US9009201B2 (en) 2015-04-14 Extended database search
Szekely et al. 2013 Connecting the smithsonian american art museum to the linked data cloud
US9449080B1 (en) 2016-09-20 System, methods, and user interface for information searching, tagging, organization, and display
US20180060410A1 (en) 2018-03-01 System and method of applying globally unique identifiers to relate distributed data sources
US9305100B2 (en) 2016-04-05 Object oriented data and metadata based search
US9830381B2 (en) 2017-11-28 Scoring candidates using structural information in semi-structured documents for question answering systems
US8965886B2 (en) 2015-02-24 System and method for providing information navigation and filtration
US8468156B2 (en) 2013-06-18 Determining a geographic location relevant to a web page
US20140372473A1 (en) 2014-12-18 Unsupervised extraction of facts
Auer et al. 2007 Dbpedia: A nucleus for a web of open data
Dittrich et al. 2006 iDM: A unified and versatile data model for personal dataspace management
Wu et al. 2004 An interactive clustering-based approach to integrating source query interfaces on the deep web
Halevy 2005 Why your data won't mix
He et al. 2004 Automatic integration of Web search interfaces with WISE-Integrator
US9275062B2 (en) 2016-03-01 Computer-implemented system and method for augmenting search queries using glossaries
US8166013B2 (en) 2012-04-24 Method and system for crawling, mapping and extracting information associated with a business using heuristic and semantic analysis
US8060513B2 (en) 2011-11-15 Information processing with integrated semantic contexts
US8019752B2 (en) 2011-09-13 System and method for information retrieval from object collections with complex interrelationships
Szomszor et al. 2008 Correlating user profiles from multiple folksonomies
2008-01-07 STCB Information on status: application discontinuation
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
In this post I will take a look at the best 2017 survey apps for mobile that are currently available. Survey apps are very useful for collecting and analyzing data by the use of surveys (accepted terminology also calls them forms or questionnaires) – list of questions with single or multiple choice answers. I've scored the apps for several criterias: number of users, general user experience, user rating and content provided. The score is highly subjective however it will give you an indication on the overall value of the survey apps.
One of the most used and most known survey app, is not necessarily the best. However it has about 25 million users (if you include the users of the web application), so if you want to go with the crowd, this is the app to use. You can create surveys using an online survey builder and get the results in the form of reports.
Also important to note is that the predefined content is vetted with RiskRhino's prestigious partners that include big four accounting firms, law firms, IT consultants, etc.
The Avius Surveys App is a gateway to real-time feedback through simple interactive custom built surveys. Once downloaded to a device, bespoke surveys allow you to utilise the device in a mount for kiosk style surveys or hand held for face to face surveys to conduct your customer research on-site. Using a combination of images and text the survey interface can be customised to blend with your existing brand.
QuickTap Survey App is a nicely designed app and offers the possibility of creating surveys. You need to sign up on their website to create surveys. One downside is that predefined content is scarce.
Thanks for sharing the list of app form the top survey. There is a feedback app I know which was very good in performance, you should try. | {
"redpajama_set_name": "RedPajamaC4"
} |
Since February 27, 2018, several reports have been placed on Council agenda related to the City's contracts with the Chamber regarding the Convention Center and the Convention & Visitors Bureau. Below is a quick summary of City Council Action.
Full staff reports and video links are available to view on the Agenda Reports/Documents.
On February 5, 2019, the City Council will take action on approval of award of agreement for the management and operation of the Santa Clara Convention Center.
TAP International presented its audit findings of the Santa Clara Tourism Improvement District (TID).
The City of Santa Clara held a Governance and Visioning Workshop on Nov. 15 at the Santa Clara Convention Center. Feedback from all community engagement efforts has been made available to the potential operator, the panel who reviewed the proposals, and the City Council that will award a contract.
At Council's direction, staff issued a 180-day termination notice and has developed a recommended procurement strategy for a contract award to manage the Convention Center and related sales and marketing services. To provide a fair opportunity to participants through a competitive process for the award of this contract, staff recommended approval of procurement process integrity and conflict of interest guidelines.
The City of Santa Clara provided notice of termination of Management Agreement for the Santa Clara Convention Center to the Santa Clara Chamber of Commerce.
Informational Report on the Status of Tourism Improvement District Financial Audit.
to submit comments, voice concerns, and protest the assessment.
Information Report provides Council with an update on issues. The performance audit process, and preliminary findings, of the Convention Center and CVB have revealed that the operation and funding of the TID are interwoven in the financial and operational structure of the Convention Center and CVB. Staff will be returning to Council on August 28, 2018 to request augmentation of the TAP International contract to include a financial audit of the TID.
Information Report provides Council with an update on issues to be placed on an August or September City Council agenda for further action. Two of Council's previous actions require more clarity on the governance structure for and legal authority of oversight of the Convention Center.
In addition to the discussion of the Chamber's request to fund a FY18/19 contract with the Chamber for CVB services, staff provided an update on previous Council direction including the commencement of a performance audit by TAP International. Preliminary audit observations were reported (see below) and apparent inconsistencies between written records and federal tax filings were also disclosed.
Council action: Council did not fund a $1.5 million request from the Chamber for convention and visitor service activity. Directed the City Manager to: 1) provide funds to Chamber for the sole purpose of funding salaries and specific related costs for up to 60 days; 2) retain JLL to assist the City in the development of options for the provision of convention and visitor services; and 3) obtain the return reserve funds from the Chamber to the City for the sole purpose of funding salaries.
Based upon the June 26, 2018 Council action, staff advised that there would be disruption in the delivery of convention and visitor services until an alternate service delivery method/provider was identified and operational.
Identified auditor and advised of Council of the status of Convention Center and CVB matters.
Council action: Directed the City Manager and City Attorney to: 1) begin process of exploring a term sheet for a new agreement with the Chamber for their management of the Convention Center; 2) begin process to execute a financial and performance audit; and 3) suspend management fee until such time as completed. | {
"redpajama_set_name": "RedPajamaC4"
} |
Charlie Jane Anders is a sentient toy giraffe with a variable number of legs (between three and seven usually) depending on how many vowels are in the name of the month. She does not glow in the dark, no matter what you may have heard, but she does gently bioluminesce in the presence of chickory. Her latest books are Victories Greater than Death and the upcoming Never Say You Can't Survive: How to Get Through Hard Times By Making Up Stories.
Panelist Links
Panelist Website
Victories Greater Than Death
Never Say You Can't Survive
Middle Grade and Young Adult Literature… in Spaaaaace! (sponsored by 4theWords)
June 4, 2021 8:00 am to 9:00 am
Panelists: Joshua Levy, Greg van Eekhout (moderator), Sarah Prineas and Charlie Jane Anders
Track: Career Management, Craft Development
Event: Nebula Conference 2021 Online
Tags: Agents, Early-Career Writers, Editors, Hybrid Writers, Late-Career Writers, Mid-Career Writers, Middle Grade Writers, Novelists, Publishers, Traditionally-Published Writers, Young Adult Writers
Authors of middle grade and young adult science fiction discuss craft and career strategies to make this often hard-to-sell category more appealing to gatekeepers.
What Sheltering-In Teaches Us About Our Speculative Worlds (Sponsored by Uncanny)
June 4, 2021 11:00 am to 12:00 pm
Panelists: Sam Rosenthal, Charlie Jane Anders, Mike Chen, Tochi Onyebuchi and Jordan Kurella (they/them) (moderator)
Track: Craft Development
Tags: Agents, Comic and Graphic Novel Writers, Early-Career Writers, Editors, Game Writers, Hybrid Writers, Indie Writers, Late-Career Writers, Mid-Career Writers, Middle Grade Writers, Novelists, Short Fiction Writers, Traditionally-Published Writers, Young Adult Writers
Writers discuss what experiencing a real worldwide pandemic has taught them about crafting speculative worlds. | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Lack of council tax reform since 2007 manifesto not an SNP failure, public finance minister says
US website '˜confused Nicola Sturgeon for scientist'
A US media website went viral in Scotland after eagle eyed Twitter users spotted that their '˜stock image' of a scientist was actually First Minister Nicola Sturgeon.
31st Aug 2017, 9:46am
Updated 12th Sep 2017, 12:06pm
First Minister Nicola Sturgeon, not a scientist. Picture: Contributed/Getty Images
Vox, a progressive campaigning website, chose to illustrate their story about the controversial Health Care reforms currently making their way through Congress, with an image of a woman looking through a microscope.
Little did they know that far from being the stock-image scientist they thought, it was actually Scottish First Minister Nicola Sturgeon, posing during a visit to a research facility.
The blunder, which has since been removed, was first spotted by journalist Jamie Ross on Twitter.
One user wrote: "Why you need a strategy for image sourcing - so you don't use a picture of Nicola Sturgeon as a 'generic scientist'".
Another added - "Seems Nicola Sturgeon has been having a second life as a stock-photo scientist in America."
It's not the first time a political leader in the UK has been mistaken for a stock image.
Former Labour leader Ed Miliband was used as the stock image for a piece about the cold and flu season aired on US TV channel NBC in December 2016.
Sign up to our Politics newsletter | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Thread: Better to Learn on?
Is it better to learn on acoustic or an electric? Keeping the following in mind, noise will be an issue. I don't live in an apartment but a house. I have to be considerate of my neighbors. One more ?; Is there a way to dampen the noise on an acoustic?
Re: Better to Learn on?
You can always use drum mutes on the acoustic for sound dampening when you practice, but then you will loose the feel of the drum heads. On the other hand, you would still have an acoustic kit for playing out. If you get a higher end e-kit, you could get mesh heads on the kit that would give you nice feel with the ability to control the volume.
It all depends on what you want. I suggest going to a local music store and trying out acoustic and e-kits, if you can.
Thanks Pastor Bob good advice. I am heading down to a music store today. Will report my opinions and feelings.
I'd say an acoustic all the way. Good electric kits that are worth the while cost too much in the first place, especially since after you learn a good bit, you'll eventually find a passion for the richness of acoustic drums and what you can't get out of electric. If you have a basement or something of the sort, mute pads will be fine for now. Once you up your selection as in number of cymbals or drums with higher qualities, you won't want those mutes, trust me... That's the only reason I would agree with an electric set.
Another suggestion though, you could do like some and buy a cheapo E-Kit with good quality and learn your fair share on it, then in the meantime save up for a good acoustic and use it for gigging and what have you. It's always a hard decision for first time drummers, but you'll find your solution.
I went to two different local music stores and played some different drum kits. I played acoustic ones and electronic ones. I really liked many of the sets I played. I now understand the wisdom in the words of Pastor Bob as he told me to possibly get one kit in each. I realized not all drums sound the same but yet they still sound like drums none the less.
I've got an awful lot to learn and my coordination to do more than one stick at a time really needs work. Secondly both stores had brand and non brand name drums on both the acoustic side and electronic side. I found the brand name drums to feel better and sound better as well. On the electronic side, the sound was a big difference between the brand and non brand names. Staying with the electronic side, I really liked the Roland sound. I preferred the sound over the Yamaha's. I could really see myself playing one of these as I got better. With the acoustic drums I could really understand how someone may prefer Pearl over Tama or the other way around. It is really in the ear of the player. The only huge thing I noticed on the acoustic side was the quality of the symbols. The cheap ones sounded really bad to me and the Zildjian's and other brand name I played(can't think of the name) sounded much better to me. Since I don't have enough knowledge to really understand the sonic differences between them, feel became very important for me.
After a few hours experience I formed a game plan. I need to keep the noise down for the sake of the neighbors. I also have to look at the cost aspect of the whole situation as this could easily get out of hand especially when I know so little about the drums at this point. I decided that ultimately I would like to have an acoustic and electric set. The electric sets are very pricey and so I will get one down the road and right now the Roland TD9SX looks like a real possibility as it seems to be nice medium for a nice set that won't break the bank. I decided to pick a decent acoustic set that can help me while I learn. I found a set I really liked and the price worked as well. I loved the feel and it came with decent cymbals. (most sets don't come with cymbals, what the hell is that all about) The kit/set I liked was Ludwig Accent CS Drum Set with Zildjian Cymbals. It was a good price, I liked the feel and the fact it came with cymbals at a decent price was good for me.
I also had my first lesson yesterday and while I learned a lot, I realized I don't know much. The good thing is I can only go up from here. Ok so your comments. Anything you would suggest different? Anything I did wrong?
Last edited by silverdragonsound; 04-05-2008 at 06:51 PM.
Doesn't sound like you did a single thing wrong to me, man. Your purchase process was very well thought out and sounds like it did some good with your overall decision. Your conclusion was great, that Ludwig is a good kit and it sounds like you got a deal with the Zildjians. To answer your question about the sets not coming with cymbals... Most beginner or used sets will come in bulk with cymbals and hardware, but once drummers become more experienced and precise with what sounds they prefer over others, it wouldn't make sense to sell a high end kit with whatever cymbals or hardware the manufacturer found fit. Keep with lessons, man. They may get tough but in the long run you will most definitely prosper from them unlike some of us who have never gotten lessons.
Thanks so much for your comments and encouraging words. I do intend to stay with the lessons as I feel a teacher will keep me honest and point out any bad habits I develop. I also like the guidance and suggestions that a teacher can give me by observing me and hearing me play. But I will tell you while I had a blast playing today on all the different kits, I stunk the place up. When I stopped playing I think people were because I was leaving.
Still we all have to start somewhere and like I said I can only get better with lots of practice which is what I intend to do.
"Music is not a race, enjoy it at your own pace" - Tommy Igoe.
Congrats on the game plan SDS! Sounds like you'll do well!
pearl also makes mesh heads for acoustic drums and they are cheaper than regular heads.you can use them.no sound,real feel!
Thanks this is good to know. I will be looking into these in the next few days. I originally want them while I'm learning because while the drums are loud, no one wants to hear someone who can't stay on beat. The cringes I created yesterday would seem to confirm this.
Hey, a lot of us have been there and done that!
hehehehehehe, that reminds me of my mums face when I first starting, everytime she came in the my practise room she looks like she was chewing on a lemon.
Hey, SDS, we've all been there and done that...you're headed in the right direction between your teacher's observations and your own discipline...everyone of us has stunk up the place on the drums at least once, but with practice, the fragrance will be more like Febreze then "eau de skunk!" | {
"redpajama_set_name": "RedPajamaC4"
} |
Is a multi-award winning global design agency who firmly believe in the power of design to enable brands to grow. Working with a variety of clients and some of the most famous brands in the world, this proudly independent agency has honed an incredibly reputation for producing cutting edge and industry leading creative over the past 25 years from their studios in London, Singapore, New York and Shanghai.
This is a highly influential position within the agency, working across creative and client servicing teams and alongside senior management. You will ensure that brand and creative strategy are embedded within the relationships of core clients whilst bringing clarity to brand definitions and guiding internal teams. You will proactively deliver brand strategy and creative growth with passion and contribute to the management of global client relationships. You will encourage and develop more junior team members as well as mentor members of the strategy team. You will also help propose and craft client proposals and maintain and external view of other industry leading work within the market.
You will ideally have between 8-10 years brand strategy experience from another top tier branding and design agency, or from working in-house. You will have worked extensively with global brands and be able to clarify, simplify and inspire. The successful candidate will have strong commercial knowledge as well as an in-depth understanding of consumer insight and thinking. You will have high level client relationship building skills, work with intelligence and conviction but also able to keep pace at this high performing, thriving agency.
If you are ready for the next challenge, please get in touch and send your CV to [email protected] or for a confidential discussion you can also call Clare Persey on +44 (0)20 7099 1086. | {
"redpajama_set_name": "RedPajamaC4"
} |
You're a thoughtful person if you are reading this review. And probably interested in climate change, too, if you've wandered here.
If you've pondered climate change in any depth, you will need to understanding the connection of big events to weather. This book is one of the guides on my climate treks. I turn to it for a better grasp of what's climate change symptons. These include extreme heat, floods and droughts, our oceans, hurricanes and the like. The book packs almost 500 pages of insight into those climate symptoms and more. And that is just Part 2.
Part 1 explains the basics of climate change. Part 3 explains the science. The book continues with insights into climate debates and solutions (Part 4). The book concludes asking What Can You Do? (Part 5) and answers with many ways you can reduce your footprint and work for action.
Treat yourself to a sumptuous smorgasbord of thoughts and facts about Climate Change. Buy this book. It is a bargain. It costs only 3 or 4 cents per page. Pages 51 and 205 and many others like it are worth at least 25 cents. Buy it, I'm sure you'll find many insight. You'll enjoy many dime's worth and often quarter's worth of wisdom. | {
"redpajama_set_name": "RedPajamaC4"
} |
Home | Politics | Philippines Joins List of Iran's Export of Crude Oil Clients
Philippines Joins List of Iran's Export of Crude Oil Clients
Iran says it is negotiating with the Philippines over exports of crude oil to the country � a fresh indication that the list of the Islamic Republic's oil clients is still expanding after the removal of sanctions last year.
The National Iranian Oil Company (NIOC) said in a statement that the Philippines was negotiating with Iran over imports of 4 million barrels of oil per month.
The NIOC added that this had been raised during a visit to Tehran by Pedro Aquino, the head of the Philippines National Oil Company (PNOC).
NIOC's statement quoted Aquino as saying that he had raised the prospects for the PNOC to win projects in the upstream section of Iran's oil industry in his meetings with the country's officials.
He added that his company was interested in investing in Iran's liquefied petroleum gas (LPG) industry, as well.
Aquino further emphasized that the PNOC is planning to construct a refinery with a capacity of 400,000 barrels per day (bpd), adding that his company was negotiating with several international oil companies including the NIOC to provide the feed for its planned refinery.
The PNOC is one of the 11 companies in a consortium of international companies, known as Pergas, which has signed a non-disclosure agreement (NDA) with the National Iranian South Oil Company (NISOC) for carrying out studies over two oilfields in Iran.
Based on the deal, the consortium will have 6 months to hand over the result of its studies on the fields to the NISOC. Pergas may submit its proposal for development of the fields sooner if it is ready, Press TV reported.
Train Derails in New York, 100 Hurt 11 Hospitalized
Homs T4 Airport Fully Secured by Syrian Army Offensives Against ISIS | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
As the reputation of the Baal Shem Tov grew, many joined the new Chassidic movement. But with growth came opposition, due to ignorance of the movement's true character. Certainly the Sabbaterian and Frankist false messianic movements, which had done enormous damage to Jewish life not long before, contributed to this apprehension. Chassidus was comparable to a beam of light at the edge of a forest: all who approached it did so very cautiously, to verify that it was indeed a friendly, welcoming inn and not a bandits' den.
R. Dov Ber had another reason to be wary of Chassidus. He viewed his ascetic practices as an important part of his Avodas HaShem. Tales of the wonders performed by the Baal Shem Tov, his emphasis on the joyous service of God, and his refection of abstention and asceticism could only increase the Maggid's suspicions of the new movement.
But the Maggid's asceticism continued to take its toll on his frail body. The pain in his legs was excruciating at times, and he and his family sought medical help throughout Europe. The doctors told him only an operation could help him, but he feared himself too feeble to undergo one. He tried various remedies, without success, and was relegated to walking on crutches. The pain did not bother him as much as the energy it sapped from his Torah studies.
There are several versions of what happened next. According to one, R. Mendel of Bar, a student of the Baal Shem Tov, came to Turchin and stayed with a local Jewish patron. the Maggid, who had been fasting daily for eight weeks, lived next door. Entering his host's home, R. Mendel heard the Maggid teaching. Impressed with what he heard, R. Mendel advised him to approach the Baal Shem Tov for a cure. "Better to take refuge in HaShem than to trust in man" (Tehillim 118:8), replied the Maggid.
Returning to the Baal Shem, R. Mendel told him, "I saw a beautiful 'vessel' in Turchin."
"I've seen him for years," replied the Baal Shem. "I yearn for him to come to me." Indeed, the Baal Shem Tov labored to win over the outstanding people destined by Providence to disseminate his teachings.
Meanwhile, the Maggid's family urged him to make the journey to Medzibozh. "How much longer will you endanger your health?" asked his wife, unable to see him in such pain. "How much longer will you stubbornly refuse to humble yourself with even one visit to the Baal Shem Tov? He works wonders! Surely he can cure you."
He finally agreed to go.
I'm told you have decided to come to me, to take refuge in the shadow of the fear of the Lord. May God's grace be upon you. You still doubt that you will accomplish your intended goal. I therefore implore you to ignore the vanities and lies of impulsive people, for they are baseless. It is not [as they say] with me. I wish only to help people, not to harm them. If, Heaven forbid, I don't find favor with you, the choice is yours. Heaven is my witness that your spirit will be doubly rewarded, the thirst of your soul will be quenched, and you will provide support for me as well. I have never written such a letter, but you have been chosen by HaShem to spread my teachings.... So abandon your stubbornness...and come to me. It will be good for us and for Klal Yisrael.
To tell the truth, I see an auspicious sign in the student who bears this letter. If R. Nachman of Horodenka is a holy Tzaddik, how much more so must his Rebbe be. Your talmid has breathed life into me, and I therefore wish you all the best.
Although I know you have opposed our ways, I hope that when you come, God willing, you will "taste the tree of life and live forever." there are very lofty matters to attend to, so come quickly and remain here.
En route to the Baal Shem, the Maggid's wagon kept breaking down. He wrote the Baal Shem Tov that he had been delayed. "My heart tells me I've been mistaken until now," he added. He finally arrived in Medzibozh on Erev Shabbos.
Upon meeting the Baal Shem Tov, R. Dov Ber began to relate everything that had happened on the way. the Baal Shem interrupted him and continued the story himself, noting each problem with the wagon and where it had occurred.
The Maggid then asked for a cure for his sickness. "My horses don't eat matzos!" the Baal Shem scolded.
Bewildered, the Maggid broke into a sweat and went outside to collect himself. Spotting R. Yaakov of Onipol, he requested that R. Yaakov ask the Baal Shem why he hadn't fulfilled the mitzvah of loving the stranger. While he sympathized with the Maggid, R. Yaakov couldn't speak so harshly to his Rebbe - at least not directly. Instead, he passed through the Baal Shem's house, and on his way out he shouted, "A forlorn Jew sitting outside wants to know why the master doesn't love strangers." The Baal Shem immediately gathered ten men to placate R. Dov Ber.
Later, as the Maggid lay bedridden, the Baal Shem recited Tehillim by his side for two weeks. "At first I wanted to cure you through prayer," he told R. Dov Ber. "But now I see that I must apply a medicinal remedy."
In another version of the encounter, the Baal Shem offered the Maggid a choice of two cures: sheimos (a Kabbalistic remedy involving the names of God), which would give him immediate strength and vigor, or a medicinal treatment, which would take much longer and be far less effective. "I am unworthy of being healed by sheimos," the Maggid replied. His illness was cured medically, but he remained weak to the end of his life. The Baal Shem remarked that had the Maggid chosen the Kabbalistic treatment, he would have become healthy enough to "chop a wagonful of wood." Years later, when R. Dov Ber's frailty made his learning more and more difficult, he openly regretted his choice.
A second version of the encounter between the founder of Chassidus and the man who would succeed him begins with a key figure - the Pnei Yehoshua, rabbi of Lvov and one of R. Dov Ber's mentors.
The Pnei Yehoshua was once learning when someone rushed into the Beis Medrash and announced that a man outside had asked to see him immediately on business. The Pnei Yehoshua went out, greeted the stranger, and asked him what was so urgent. "Your shochet has been selling treife meat for over ten years," the man replied breathlessly. "Send for him and see for yourself." With that, he sped off in his carriage before the Pnei Yehoshua could ask who he was. Later, when the shochet (slaughterer) finally confessed, the Pnei Yehoshua realized that the stranger must have been the famous Baal Shem Tov.
Some months later, the Baal Shem reappeared outside the Beis Medrash. This time the Pnei Yehoshua came out immediately and recognized him. "When R. Dov Ber lodges here, tell him in my name that his legs will not be well unless he comes to me," declared the Baal Shem. Again, he sped away.
When the Pnei Yehoshua moved to Frankfurt to serve as its rabbi, his son-in-law replaced him as rabbi of Lvov. Before his departure, the Pnei Yehoshua advised his son-in-law to consult R. Dov Ber whenever necessary and the Maggid developed a warm, stimulating relationship with the new rabbi of Lvov.
Obstinately ignoring his family's urgings to see the Baal Shem Tov, R. Dov Ber soon grew incurably lame. Desperate, his family asked the rabbi of Lvov to visit his sick friend. Perhaps he could convince him to go to the Baal Shem.
When he suggested to R. Dov Ber that he travel to the Baal Shem, the Maggid expressed his reservations about the "miracle-worker." "Why not go see for yourself?" the rabbi suggested. "Surely you cannot judge without seeing the Baal Shem in person."
This approach appealed to the Maggid, and he set out for Medzibozh. On the road, however, he began to wonder whether a scholar was permitted to take so much time from his studies. He consoled himself by anticipating that the Baal Shem Tov would surely impart the kind of divrei Torah befitting a Tzaddik who had inspired thousands of Jews.
R. Dov Ber arrived on Erev Shabbos and spent Shabbos with the Baal Shem. At the Friday night seudah (meal), the Maggid listened attentively, hoping to hear teachings affecting Heaven and Earth.
"Once I was traveling with Alexi, the wagoneer," recalled the Baal Shem. "We came to the middle of the forest and there was no more hay for the horses. We didn't know what to do until, thank God, a non-Jew passed by with his horse and gave us some hay." With that the Baal Shem said Birkas HaMazon and the meal was over.
The Maggid was horrified. "Instead of delving into the depths of man's soul," he thought, "he speaks about horses!" He considered absenting himself from the second Shabbos seudah, lest he waste even more time. But he didn't want to embarrass his host and hoped that this time things would be different.
The next day, the Baal Shem recollected how he and Alexi had once traveled through parched fields under a scorching sun, with no water to drink and no spring or well in sight. They wouldn't reach the nearest town until evening. Suddenly, like a Godsend, a non-Jew appeared carrying water buckets. When they asked what he was doing in such a remote place, he replied, "I don't know myself. My feudal lord seems to have lost his senses. He sent me on a three-day journey through the forest and fields with these buckets, and today is the third day."
The Maggid understood that these stories were intended to demonstrate HaShem's providence. It was the Baal Shem's way of instilling emunah in people by means of parables and mundane stories. What he didn't know was that they contained deep wisdom as well.
He decided to skip Shalosh Seudos and return home immediately after Shabbos, without even seeking a cure or spiritual guidance.
There wasn't enough moonlight to begin the return journey home. At midnight R. Dov Ber was summoned to the Baal Shem. His host inquired if he knew how to learn Kabbalah. When the Maggid replied affirmatively, the Baal Shem asked him to explain a passage in Eitz Chaim (Tree of Life) by Rav Chaim Vital, a disciple of the Ari, z"l.
The Maggid studied the passage for a few minutes and proceeded with his explanation. "You don't know anything!" declared the Baal Shem. The Maggid reread the passage. "My interpretation is correct," he maintained. "Tell me yours and we'll see who's right."
The Baal Shem grasped the book, and his face began to shine. He told R. Dov Ber to stand. Light filled the room, and the Baal Shem was encircled by fire. The Maggid saw angels appear as the Baal Shem recited their names, and suddenly he understood the lofty secrets hidden within the text.
At this point, the Maggid could no longer stand, and the Baal Shem showed him to a bed. The Maggid later related, "I no longer saw him, but for two hours I heard sounds and beheld awesome fire and lightning. I became very frightened and fainted."
The Baal Shem later told the Maggid, "Your interpretation was correct, but you were learning only the 'body' of the hidden Torah. Now you have penetrated its 'soul.'"
R. Dov Ber remained in Medzibozh for an extended period, and became a disciple of the Baal Shem Tov, learning great wisdom and deep secrets, and clinging to him with his heart and soul.
When R. Dov Ber had returned from Medzibozh the rabbi of Lvov asked his friend how he had laid to rest all his doubts about the Baal Shem Tov. R. Dov Ber answered by recounting his mystical experience with the Eitz Chaim. "I looked into the Baal Shem's face and thought, 'Could this be a creature like us, a mortal? Perhaps he has fallen from Heaven.' This resolved all my doubts, for one can question his fellow man, but not a Heavenly creature."
The meeting of the founder of Chassidus and his successor was both fateful and mysterious. Like most Torah scholars, R. Dov Ber fully expected a meeting of minds, an incisive debate, an exchange of ideas and chiddushim. What he heard, instead, were cryptic words and seemingly simple stories. This meeting was, for the next head of the Chassidic movement, an unforgettable lesson in the power of simplicity and the limitations of a scholarship which does not reach into the inner soul of the Torah.
The Talmud states: "One cannot compare someone who reviews his learning one hundred times with one who does so one hundred one times" (Chagigah 9b). Before he met the Baal Shem Tov, it was said of R. Dov Ber that there wasn't a single work, including the works of the Kabbalah, that he hadn't learned one hundred one times. Nevertheless, his learning with the Baal Shem far surpassed anything he had studied before. He was amazed by the Baal Shem's grasp of the "soul" of the subject. Indeed, it is said that once, when hearing the Baal Shem expound the work of the early Kabbalists, he touched the Baal Shem's hand to convince himself that such wisdom could come from a flesh-and-blood mortal.
Despite his poor health, the Maggid learned with the Baal Shem in Medzibozh every night. In these lessons the Baal Shem passed on to him many secrets and much hidden knowledge: the language of birds and trees, Divine Names, and Unifications. Together, they pored over the Kabbalistic works Ma'ayan Chochmah and Raziel HaMalach.
Once, learning with the Baal Shem became so intense that the Maggid fainted and unconscious for several hours. The Baal Shem went to the mikveh three times that day to pray for his recovery.
The Baal Shem recognized the greatness of the Maggid from the beginning. He told one of his disciples, R. Chaim of Krasna: "When the Maggid came to me, he was already a pure, golden menorah. All that was needed was to light the candles...."
On another occasion, he declared, "If the Maggid were healthy enough to immerse in the mikveh, Moshiach would come immediately, for this act would inspire mankind to repent."
The Maggid eventually wanted to return home, but the Baal Shem Tov pleaded with him to stay: "Don't leave, I need you. For you are like one who draws from a wellspring and causes it to replenish itself. An unused well can dry up, but one whose waters are drawn gushes abundantly."
"People think of my grandfather, the Maggid, as a student of the Baal Shem Tov," related R. Yisrael of Rizhin. "It was not so: they taught each another. But my grandfather was weak and sickly, while the Baal Shem was strong and healthy, and able to absorb more."
The Baal Shem once expressed this himself to R. Dov Ber: "What is the difference between you and me? We can both bring benefits and blessings to the Jews. But I can effect this by merely thinking, whereas you must marshal your will."
Not everything the Maggid learned in Medzibozh was taught through seforim. When the Maggid asked the Baal Shem Tov to explain why the Zohar states that the verse "And these are the judgments..." (Shmos 21:1), refers to the secret of reincarnation, he told his disciple to go to a forest and stand near a tree by a stream. the Maggid did so, and soon a well-dressed, wealthy-looking man came by, rested in the shade of the tree, and drank from the stream. He then left, but forgot his wallet. Another passerby found the forgotten wallet, pocketed it, and walked off. Then a wretched-looking pauper lay down beneath the tree to rest from his wearying journey. Before he could close his eyes, the first man came back in search of his lost wallet, accused the poor man of its theft, and beat him relentlessly.
The Maggid, perplexed, returned to Medzibozh, where his mentor explained what had taken place.
"In their first incarnation on this earth," said the Baal Shem Tov, "one man took another to court, demanding a certain sum of money. Though the man's claim was well-founded, the judge negligently dismissed the case.
"In their return to this earth, the man who actually owed the money lost his wallet, which contained just the sum under dispute. The man who ought to have collected that sum in court found the wallet. The pauper had been, in his first incarnation, the judge, so he was roundly beaten because he'd caused the debtor to sin by keeping money not rightfully his. Thus, each got what he deserved! That, then," he concluded, "is the meaning of the Zohar - 'the secret of reincarnation.'"
"Why are you followers called chassidim?" the Maggid once asked the Baal Shem Tov. "Our Sages say Chassidus is greater than sanctity, humility, fear of sin, Divine inspiration, and even resurrection of the dead."
"We learn that one who burns his cut fingernails is called a 'Chassid,'" replied the Baal Shem. "Though it is very difficult to burn fingernails, the chassid does so to prevent others from being harmed. He sacrifices himself for others, going beyond the letter of the law, and completely nullifies himself. This, then, is Chassidus: going beyond the letter of the law in mitzvos between man and HaShem, and between man and his fellow man."
R. Dov Ber considered the Baal Shem Tov a purely spiritual being. He related, "I once beseeched Heaven to show me someone whose limbs and sinews were completely sanctified. I was shown the Baal Shem Tov, but with no semblance of a body, just a pure flame.
"One erev Yom Kippur, at the Baal Shem's table, I saw him as a flame of fire: His hands were fiery and so was his food. The Baal Shem later revealed to me that at that moment he had learned the insights gained by Moshe Rabbenu when he ascended Mount Sinai and remained there for forty days and nights without food." Indeed, the Maggid asserted, "I am greater than all Baal Shem Tov's disciples. For only I have seem him elevate every item of food and drink he puts into his mouth."
Another erev Yom Kippur, the Baal Shem's tallis slipped out of his gartel. The Maggid approached and carefully tucked it back into place. Suddenly, he was overcome with fear of HaShem. He was so overwhelmed that he almost fell, and when he grabbed a table for support, he declared, "Master of the Universe, I didn't know my Rebbe had such awe of You!"
R. Moshe of Kubrin related that many years after the Baal Shem's passing, the Maggid found a handkerchief among his personal effects. When he noticed some snuff left on it by the Baal Shem, he was seized with such fear that he fainted, and it took great effort to revive him.
R. Moshe of Kubrin also told of two relatives of the Baal Shem who asked him to settle a dispute. Believing himself to be an interested party, he sent them to the Maggid. As R. Dov Ber sat down before them, he suddenly heard the Baal Shem's footsteps in an adjoining room. Fearful that this eavesdropping might jeopardize his impartiality, he rose and declared, "By the power of the Torah and the court, whoever need not be here should leave." The Baal Shem obeyed the decree and left.
"Despite the Maggid's great fear of his Rebbe," concluded R. Moshe "his fear of God was even greater!"
In return for a favor, R. Shneur Zalman of Liadi once asked the Maggid to reveal the Baal Shem Tov's essence. After careful thought, he commented, "Had he lived in the times of the Tannaim, he would have been a wonder; in the era of the Prophets, an innovation; and, in the period of the Patriarchs, noteworthy."
Had R. Shneur Zalman not heard it from his Rebbe the Maggid, he wouldn't have believed the Baal Shem Tov mortal.
Besides studying under the Baal Shem Tov in Medzibozh, the Maggid was being groomed to succeed him. Some say the Baal Shem saw this as soon as the Maggid arrived, never proclaiming it but alluding to it at times. Certainly, the Maggid was particularly singled out for honor by his new-found Rebbe.
Dov Ber ben Chavah: For a salvation of body and soul, a complete recovery for his sick legs, the purification of his soul, spirit, and body by the light of the holy Torah, and true emunas chachomim [faith in the Sages] for him and his household, among all Israel. Pidyon nefesh [the redemption of a soul]: two rubles.
Yisrael ben Sarah: For health and a good, long life. He should merit to form a bond with all souls, connecting them to their roots; and all his enemies should repent and become his friends. May HaShem will it, and may you be inscribed and sealed for good. Pidyon nefesh: one ruble per week.
It was an extraordinary gesture: receiving a kvittel from the founder of Chassidus himself! No doubt, the Maggid of Mezritch was the only person ever so honored.
When the Maggid left his Rebbe to head home, the Baal Shem placed his hands on his protege's head and blessed him. Then the Baal Shem lowered his own head and asked for the Maggid's blessing. The Maggid tried to pull away, but the Baal Shem grasped his hands and placed them on his head. The Maggid had no choice but to bless him as well. | {
"redpajama_set_name": "RedPajamaC4"
} |
Whey protein is a mixture of proteins that come from whey. Whey is is the liquid part of milk that becomes separated while making cheese. When taking whey protein as a supplement, it is important to know how to manage the timing of it. This is why we are discussing when to take whey protein. Proper timing can make all the difference in the world.
Whey protein is a rapid acting milk protein. It can help increase rates of protein synthesis by delivering amino acids to your muscles. This gets the anabolic process into motion. Most bodybuilders choose whey protein from the long list of protein powders because of how easy it is to digest. Once it enters the body it breaks down more quickly than any other protein supplement. This helps send amino acids to the muscle tissue as fast as possible.
Bodybuilders need whey protein in their diets to increase muscle gain because it is proven to improve performance as well as gain muscle mass. Whey protein provides our bodies with a high amount of protein that can help kick start the muscle growing process which is obviously one of the main goals of bodybuilding.
Whey protein is most effective when taken at or before breakfast due to our catabolic state when sleeping. While we are sleeping, our bodies enter a catabolic state because we go 8-9 hours without food. During this state, our bodies want to turn our muscles into fuel to keep us going. Consuming 20 to 30 grams first thing in the morning will keep your muscles strong and present.
What Are The Benefits Of Whey Protein?
What Are The Risks Of Whey Protein?
Whey protein can be a very beneficial supplement for men and women who are focused on bodybuilding and leading active lifestyles. If you are planning on supplementing with whey protein, remember to note when and how to take whey protein. | {
"redpajama_set_name": "RedPajamaC4"
} |
Plus One Health Management Inc., New York, announced that CEO Mike Motta is now the chairman of the company. Plus One also promoted Chris Ciatto from COO to CEO and Tom Maraday from senior vice president to chief development officer.
Motta, who founded Plus One in 1986, served on the board of directors for the International Health, Racquet and Sportsclub Association (IHRSA) from 2004 to 2008 and received IHRSA's Dale S. Dibble Distinguished Service Award in 2010.
Ciatto, who also will join Plus One's board of directors, was COO of the company for six years. Maraday has held various leadership positions at Plus One for the past 21 years.
Plus One has grown to 160 fitness centers and wellness programs in 23 states, the District of Columbia, Puerto Rico and Canada.
The company produced almost $46 million in revenue in 2010 according to its submission for Club Industry's Top 100 Clubs list. Plus One produced $44.8 million in revenue in 2009, placing the company at No. 26 on last year's Top 100 Clubs list. | {
"redpajama_set_name": "RedPajamaC4"
} |
Q: Secure way to send information from Java to database? I need a secure way to send information from a Java application to a database for my website. I currently have a PHP page on the server that accepts the parameters posted from a URLConnection in Java, and then updates the database. My fear is that, if somebody decompiles it, they can see the exact URL and parameters. I am new to this type of development, so I don't know a better/safer way to do it.
What is a better or safer way to get the data to the database?
A: If you want to give the application access to the database then you can never 100% prevent any application simulating the behaviour of your application from having the same access. period. You can only make your pattern harder to be found.
Better is letting your server (in this case your php-document) validate each and every input it gets so that bad behaviour is excluded. Let the php generate querys and let the client-application only send the data needed like username, password or other information. in your php, you have to be prepared, that everything could be send, not only data you expect. Use prepared statements to prevent sql-injections and use regex to sanitise any input given.
A: If I understood well, you're afraid that someone will find out from your code url, username and password and connect to the database with these parameters. You can prevent that misbehaviour on network layer (i.e. allowing only your IP address to access the database by configuring firewall) or, if you cannot alter firewall/router configuration then change the database configuration. For example, PostgreSQL has a file pg_hba.conf where you can specify list of IP addresses that are allowed to access. However, you must prevent other vulnerabilites like SQL injection that use your connection to the database.
A: From the sounds it, your using a Java program to connect to your PHP/server. If your worried about the security of the connection, you could establish a SSL connection using HTTPS (example here)
You could also establish a challenge/response protocol, where the server requests some kind of key from the client, this could use a rolling series of public/private keys with the message encrypted with these to further reduce the chance of a false input request
| {
"redpajama_set_name": "RedPajamaStackExchange"
} |
Yevgeniya Nikandrovna Khanayeva (; 2 de janeiro de 1921, Noginsk - 8 de novembro de 1987, Moscou) foi uma atriz soviética de cinema e teatro. Ela foi premiada com o Prêmio Artista do Povo da URSS em 1987.
Filmografia selecionada
Monólogo (1972)
Dia a dia (1972)
Adultos estranhos (1974)
Piada prática (1976)
Moscou não acredita em lágrimas (Moskva slezam ne verit) (1979)
O velho ano novo (1980)
Simplesmente horrível! (1982)
Мать Мария (1983)
Безумный день инженера Баркасова (1983)
The Blonde Around the Corner (1984)
Ligações externas
Atrizes da União Soviética
Mortos em 1987
Nascidos em 1921 | {
"redpajama_set_name": "RedPajamaWikipedia"
} |
Filed to: Tell Em!Filed to: Tell Em!
Our favorite woman from the Bronx is doing what she does: calling rich people out.
Rep. Alexandria Ocasio-Cortez (D-NY) and Rep. Chellie Pingree (D-Maine) sent a letter to Microsoft, Google, and Facebook executives dated Friday questioning whether these three tech giants are actually down to stop climate change. If they were, why did they recently sponsor a conference that included a session promoting climate change denial?
LibertyCon, a student-led conference that invites students and non-students alike to learn about libertarianism, took place in Washington, D.C., earlier this month. Only two sessions were about climate change, according to this agenda, but the representatives took issue with one, in particular. The speaker, Caleb Rossiter, is a member of the CO2 Coalition, a nonprofit that advocates for more carbon dioxide in the atmosphere. The organization is all about questioning climate change, which science has shown time and time again is an increasingly urgent problem.
Facebook simply pointed us to its event sponsorship policies and commitment to fighting climate change. Spokesperson Andy Stone was sure to share the conference's agenda with Earther to note that another panel on carbon taxes was also featured, but did not address the concerns raised by the Congresswomen in their letter.
The conference also included a panel with speakers from the Heartland Institute, which also fuels the climate denial machine. In all fairness, other topics include civil rights and criminal justice reform, but none of that detracts from the conference's attempt to validate climate denial.
These tech companies purport to take climate change seriously—especially on the clean energy front. (Google, unfortunately, still has a lot to learn about managing the spread of climate misinformation.) These companies know climate change also creates a business opportunity, but they're not bad enough to knowingly support climate deniers, right?
At least we can count on Ocasio-Cortez to hold them accountable when that looks like what they're doing. | {
"redpajama_set_name": "RedPajamaC4"
} |
Delaware Legislature Adopts Amendments to Delaware General Corporation Law
By Mark D. Wood & Martin Q. Ruhaak on August 9, 2013
Posted in SEC/Corporate
Effective as of August 1, 2013, the Delaware legislature adopted several significant amendments to the Delaware General Corporation Law (DGCL).
No Stockholder Vote Required in Certain Second-Step Mergers
Prior to the adoption of the amendment to Section 251 of the DGCL, following the consummation of a tender or exchange offer, an acquirer was required to obtain approval of a second-step merger from the target corporation's stockholders unless the acquirer owned at least 90% of each class of the target corporation's voting stock. That was the case whether such ownership was acquired directly in the first-step tender or exchange offer or through the use of a "top-up option" following the offer. That meant that, if the target corporation was a public company and the acquirer failed to achieve the 90% threshold, the target corporation would need to prepare and file with the Securities and Exchange Commission a proxy or information statement with respect to the stockholder vote (which proxy or information statement would have been subject to potential SEC review). As a result, there could have been a meaningful delay between the closing of the tender or exchange offer and the completion of the second-step merger, which could adversely impact debt financing for the transaction.
Under new subsection (h) of Section 251, unless the target corporation's certificate of incorporation expressly requires otherwise, a vote of the target corporation's stockholders would not be required to authorize a second-step merger following a tender or exchange offer if: (1) the merger agreement expressly provides that the merger will be governed by Section 251(h) and that the second-step merger will be consummated as soon as practicable following the offer; (2) the acquirer consummates the offer for any and all of the outstanding stock of the target corporation that would otherwise be entitled to vote on the adoption of the merger agreement; (3) following the consummation of the offer, the acquirer owns at least the percentage of the stock of the target corporation that otherwise would be required to adopt the merger agreement; (4) at the time the target corporation's board of directors approves the merger agreement, no other party to the merger agreement is an "interested stockholder" (as defined in Section 203(c) of the DGCL) of the target corporation; (5) the acquirer merges with the target corporation pursuant to the merger agreement; and (6) the outstanding shares of the target corporation not canceled in the merger are converted into the right to receive the same amount and kind of consideration paid for shares in the offer.
Section 251(h) applies only to target corporations with shares listed on a national securities exchange or held of record by more than 2,000 holders immediately prior to the execution of the merger agreement.
Pursuant to a parallel amendment to Section 262 of the DGCL, appraisal rights are available to the target corporation's stockholders in connection with a second-step merger effected pursuant to Section 251(h), unless all of the stock of the target corporation is owned by the acquirer immediately prior to the merger.
Ratification of Defective Corporate Acts
Under new Section 204 of the DGCL, no corporate act or purported stock issuance would be void or voidable solely on the basis of a failure of authorization, so long as the act is ratified in accordance with the procedures outlined in new Section 204 or validated by the Delaware Court of Chancery in a proceeding under new Section 205.
In order to ratify a defective corporate act, the board of directors of the corporation is required to adopt a resolution stating (1) the defective corporate act to be ratified, (2) the time of the defective corporate act, (3) if such defective corporate act involved the issuance of shares of stock, the number and type of shares of stock issued and the date or dates upon which such shares were purported to have been issued, (4) the nature of the failure of authorization in respect of the defective corporate act to be ratified and (5) that the board of directors approves the ratification of the defective corporate act. The corporation's stockholders are also required to adopt the resolutions adopted by the board of directors, unless (1) stockholder approval was not required at the time of the board's adoption of such resolutions or would not have been required at the time of the defective act and (2) the defective act did not result from a failure to comply with Section 203 of the DGCL (the business combinations statute).
New Section 205 grants the Delaware Court of Chancery exclusive jurisdiction to determine the validity of any defective corporate acts ratified pursuant to Section 204. Under Section 205, the Delaware Court of Chancery has broad powers to determine the validity of any defective corporate act, including the power to modify or waive any provision of Section 204.
Formula for Stock Issuance Consideration
Section 152 of the DGCL was amended to clarify that a board of directors may determine the price at which the corporation's stock is issued by approving a formula by which such price is determined.
Public Benefit Corporations
New Sections 361 through 368 of the DGCL authorize the formation of for-profit corporations, known as "public benefit corporations," that are formed for the purpose of promoting public benefits. A "public benefit" is broadly defined as a "positive effect (or reduction of negative effects) on one or more categories of persons, entities, communities or interests." The board of directors of a public benefit corporation is required to balance the pecuniary interests of the stockholders, the best interests of those materially affected by the corporation's conduct, and the specific public benefit or public benefits identified in the public benefit corporation's certificate of incorporation when it manages the corporation's business and affairs. The stockholders of a public benefit corporation owning a specified threshold of the corporation's outstanding shares are permitted to bring a derivative suit asserting that the board of directors is not fulfilling the public benefit mandate.
Shelf Corporations
Amendments to Sections 312(b) and 502(a) of the DGCL are designed to discourage the establishment of "shelf" corporations having no activities, directors or stockholders. As amended, Section 312(b) provides that only directors or stockholders may authorize a renewal or revival of a corporation that has ceased to be in good standing. As amended, Section 502(a) prohibits an incorporator from signing any annual franchise tax reports (other than the corporation's initial report) and requires a corporation to list at least one director on its franchise tax reports.
SEC Statements Regarding SPACs Address Warrants and Projections
SEC Approves Amendments to NYSE Shareholder Approval Rules for Certain Equity Issuances and Requirements for Related Party Transactions
SEC Corp Fin Staff Issues Statement on SPAC Transactions | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
Another common forms of sudden medical emergency is a Seizure, a seizure is a sudden temporary alteration of brain function leading to spontaneous movement or absence of consciousness. Abnormal electrical signals in the brain result in disturbed brain function, shaking, contraction of limbs and altered personality / consciousness are common.
In many cases a seizure is "Not life threatening" it is "where it happened" or "what caused" the seizure that can lead to a potentially life threatening event. A seizure from a fever "Febrile" or having a seizure in water, while walking down stairs, or even from a drug overdose / withdrawal may become life threatening. In many cases the seizure will pass on its own within a few moments, if the seizure last longer than 3-5 minutes, happens repeatedly, or if potentially life threatening event may have caused it, call 911 and never waste time.
Hallucinations such as seeing, hearing, tasting or smelling something that doesn't actually exist.
Follow the guidelines from your health care provider if you are known to have epilepsy or regular seizures.
If you have seizures, take your prescribed medication regularly.
If a child has a fever, make sure it doesn't get too high, if a child's fever is higher than a fever caused by a normal cold or flu, seek medical attention immediately.
-Young children or babies with a high fever can have seizures "Febrile". In most cases these are not life-threatening and they do not last long. However the child or baby should be taken to emergency immediately to prevent further potential brain injury.
Give the child medication recommended by the child's doctor to reduce the fever.
Give the child a sponge bath with water that is "room temperature" (not icy cold) – Ice cold water during a fever may cause the patient to go into shock.
Provide continual care by seeking a medical direction.
Call 911 and get an AED if you are alone, you suspect a Head / Neck or Spine injury, there is a motor vehicle collision, dangerous environment or the injured persons life could be at risk.
– If there are other life threatening injuries, treat those first as quickly as possible with as little movement to the injured person.
– NEVER PUT ANYTHING IN THE PERSONS MOUTH – The patient will "not" swallow their tongue.
a) Do not restrain the patient – allow the person to move without restraint.
b) Protect the person from injury by moving furniture, protecting the person's head with blankets and keep other dangers away from the person.
Perform a secondary survey and treat any non-life threatening conditions. Make sure there aren't any fluids in the person's mouth, place the person in the recovery position, keep the person comfortable and warm.
(NOTE) Many patents will feel ill, thirsty and disoriented, help re-hydrate the patient with high electrolyte drinks, find a position of comfort, and rest. Seek medical attention if the seizure returns.
Kneel Beside the victim and place the victims furthest arm from you above their head.
Place the arm closest to you across the victims chest as a protector arm.
The Key is in their Knee, bend the nearest leg up at the knee.
Carefully slip your hand under the hollow of the victims neck to support the Head Neck & Spine, at the same time use your forearm by slipping it carefully under the shoulder for leverage.
Place your free hand on the Key Knee and gently roll the victim away from you by applying steady pressure against the knee and shoulder at the same time. The victims head should rest on their raised arm.
To secure the position pull the key knee further up and bring their protector arm out to use the elbow to stabilize the position.
Check the Airway to make sure their still breathing. | {
"redpajama_set_name": "RedPajamaC4"
} |
By placing the last "date updated" on the table when you first bring up the inventory or in search it would tell us when we last updated pricing data on an item. Right now it's a pain because I have to instruct people to call the suppliers every time we quote something that isn't an every day/week sale.
Having it right in the first table lets us see this without actually clicking on the item, saving us time when talking with the customer on the phone for price checks and things. | {
"redpajama_set_name": "RedPajamaC4"
} |
John Bolton Breaks Silence After Trump Impeachment: 'I Knew What I Was Getting Into'
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=50902"><span class="small">Miranda Bryant, Guardian UK</span></a>
Bryant writes: "John Bolton celebrated Presidents' Day by breaking his silence for the first time since Donald Trump's impeachment trial - speaking of his frustrations and teasing the content of his forthcoming book."
John Bolton. (photo: Jose Luis Magana/AP)
By Miranda Bryant, Guardian UK
Former national security adviser scant on details about Ukraine, but says he worries 'effort to write history' will be censored
ohn Bolton celebrated Presidents' Day by breaking his silence for the first time since Donald Trump's impeachment trial – speaking of his frustrations and teasing the content of his forthcoming book.
But when it came to his former boss, the president's former national security adviser was scant on details, hinting that he is restricted in what he can say.
Bolton, who left the White House in September following foreign policy disagreements, was interviewed on stage on Monday night at Duke University in Durham, North Carolina.
It was his first public speech since Trump's impeachment trial where – despite repeated appeals by Democrats for him to testify, and Bolton's stated willingness to do so if subpoenaed – he did not speak to Congress.
But following the leak of a draft of his unpublished forthcoming memoir, which reportedly described how Trump told him he wanted to delay US military aid to Ukraine until its government agreed to investigate Democrats, including presidential hopeful Joe Biden, his shadow loomed large over proceedings – which ended in Trump's acquittal.
Duke did not allow audio recording or livestreaming at the main event. Interviewer Peter Feaver, a professor of political science and public policy at the university, is understood to have told the audience that the restrictions were due to Bolton's contract.
But journalists present at the event live tweeted Bolton's comments as the pair spoke on stage.
Asked about Trump's tweets about him, Bolton is reported to have said he could not comment, pending a White House review of the manuscript for his forthcoming book. "He tweets, but I can't talk about it. How fair is that?" he said, according to one reporter present.
When asked on Monday what it was like to staff Trump's 2018 meeting with Putin in Helsinki, Bolton reportedly said: "To pursue the right policies for America, I was willing to put up with a lot."
"I'm not asking for martyrdom," he added. "I knew, I think I knew, what I was getting into."
According to CNN, Bolton and his lawyers have been battling with the White House about the book, scheduled to be published under the title The Room Where it Happened next month.
The Trump administration is reportedly concerned about the inclusion of classified information protected by executive privilege. CNN reports that the White House records management is reviewing the book.
During Monday's talk, he appeared to repeatedly trail the memoir.
On the subject of Helsinki, he also replied – reportedly to audience groans: "I could read a chapter from my book here and give you the answer to that question."
After a question about whether he agreed with Trump that his 25 July call was "perfect", he said: "You will love chapter 14".
He also reportedly referred to "censorship" of the manuscript. "This is an effort to write history … We'll see what happens with the censorship," he said.
Outside the venue, dozens of protesters gathered for a "The People v John Bolton Rally". A Facebook page promoting the event described Bolton as "architect of the Iraq war, Islamophobe and war criminal" and criticised Duke for hosting him as an "esteemed speaker".
His Duke visit is the first of two university appearances this week. On Wednesday he is due to speak with Barack Obama's national security adviser Susan Rice at Vanderbilt University in Nashville on the subject of "defining US global leadership". | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
The instrumental music department also maintains an active jazz ensemble throughout the year. Students meet every Wednesday evening from 6:00 to 8:00 pm. The band performs at numerous community functions throughout the year which include the Mayor's Senior Citizens Valentine Day Dance. The band has also had the honor of having renowned musicians perform and work with them. These have included Gabe Baltazar formerly of the Stan Kenton Orchestra, Bill Watrous, Mike Lewis formerly of the Buddy Rich Big Band, Noel Okimoto, and David Choy. | {
"redpajama_set_name": "RedPajamaC4"
} |
Category: Anniversaries
GFF18 #2: Zama (Argentina-Spain-France-Netherlands-Mexico 2017)
The opening shot of the film with Daniel Giménez Cacho as Diego de Zama
The introduction to this screening by co-director of the festival Allison Gardner suggested that "the film is very beautiful but difficult". Which is actually quite a good description. It is visually very fine and it sounds good too – with several songs by Los Indios Tabajaras. (This was disconcerting because I recognised the music as being from the same performers who open and close Wong Kar-wai's Days of Being Wild (HK 1990)). I learned subsequently that the original Zama novel by Antonio di Benedetto, first published in 1956, was only translated into English in 2016 and is considered as one of the great works of Argentinian literature. In Lucrecia Martel, one of Argentina's most celebrated filmmakers. it has found a new champion for an international audience.
Zama is constantly being forced to move, a deeply disturbing feeling of not being wanted. Here he carries his chair to another shack while watching the local people.
Diego de Zama is a corregidor (a Spanish title for an agent of the King) in the 1790s in a remote part of the Viceroyalty of the Río de la Plata in present day Paraguay. Zama feels trapped in a backwater and repeatedly asks the local Governor to write to Spain on his behalf to request a transfer. This becomes an endlessly repeated plea to the Governor who finds all kinds of excuses not to deliver. This perhaps is an indication of the 'difficulty' of the narrative as the process becomes something like that suffered by one of Kafka's characters – or perhaps like Yossarian in Catch 22? "Have you written to the King?" becomes Zama's mantra.
The hypnotically beautiful imagery of the world into which Zama stumbles in the last part of the narrative.
Zama has 'status' as a colonial figure (initially he appears to act as a magistrate) but no real discernible power except that conferred on a European by conquest. Martel presents the colonial world in a manner that is both terrifying and hypnotically beautiful. This is a film in which it pays to look and listen without trying too hard to find conventional film narrative cues as to what might happen next. The Kafkaesque world of the settlement in the first half of the narrative becomes the very beautiful but also terrifying world of the 'unexplored' territory where Zama finds himself supposedly searching for the possibly imaginary figure of a bandit/pirate. The only way I could make some kind of sense of what was happening in this second half was to draw on other similar films and stories. The closest parallel I could think of was another Argentinian film, Lisandro Alonso's Jauja (Argentina 2014) in which a Danish engineer working for the Argentinian colonial forces in the 19th century becomes similarly deranged in the 'jungles' of Patagonia while searching for the 'pirate' who has kidnapped his daughter.
Daniel Giménez Cacho and Lola Dueñas in ZAMA (2017)
After the screening I found that the best way to get a handle on Zama came via this review-essay on the original novel by J. M. Coetzee. Lucretia Martel has changed some aspects in her adaptation but the essentials remain and Coetzee's review explains quite a lot of the background. I was pleased to see that my identification of Kafkaesque features is backed up. Some of the promotional material for the film suggests that this an 'existential drama' but Coetzee argues for Borges and Kafka as the inspirations for the 1950s novel. The other point from the review that intrigued me is the reference to Zama as a Creole character. From a UK perspective this can sometimes mean a mixed race person, but here it means that although Zama is 'European', he was born in the Americas and his status is therefore between the indigenous people and those born in Spain. He has relationships with indigenous women and also seeks out Spanish women, one of whom is played by Lola Dueñas. In British colonial terms he seems to have 'gone native'. Spanish colonialism was perhaps less rigid – though no less harmful. Also important is the new 'division' in the colony between the new metropolitan centre, Buenos Aires and the 'marginal' colonial outposts.
I'm not sure how Zama will sell in the UK. It is due for release by New Wave, an excellent independent distributor, on May 25th. This is a film that is backed by many major figures in Hispanic and Latin American cinema. Lola Dueñas and Daniel Giménez Cacho (Spanish and Mexican respectively) have both worked for Pedro Almodóvar's company El Deseo which is a production partner. Leading actors from Argentina and Brazil are in the cast and executive producers include Gael García Bernal and Diego Luna. But yes – it is a difficult film. I hope audiences are willing to grapple with it and experience its splendours as a piece of filmmaking and a genuine attempt to tell us something about the history of Latin America. I look forward to exploring the film later on DVD but please do go and see it in the cinema if you get the chance. It's one of the best films I've seen this year so far.
Written by Roy Stafford 1 Comment Posted in Anniversaries, Argentinian Cinema, Festivals and Conferences, Films by women, Latin American Cinema, Literary adaptations Tagged with GFF18, historical drama, Spanish colonialism
I did not think that this was a great year for new releases. There were some very fine films, though often one had to seek them out.
I thought that the Palestinian film 3000 Nights / 3000 Layla (2015) was a powerful portrait of the effects of occupation.
Certain Women (2016) was another fine film from Kelly Reichardt with four excellent performances.
I am Not Your Negro (2016) was a very good documentary though I thought it was weakened by not directly addressing James Baldwin's homosexuality.
After the Storm / Umi yori mo mada fukaku (2015) was another fine family drama from Kore-eda Hirokazu.
Dunkirk, Christopher Nolan patriotic epic, is here in its 70mm/IMAX version: a true cinematic experience.
Sally Potter's The Party was one of the wittiest films of the year, standing out from some of the more heavy-handed satires.
Happy End was typical of Michael Haneke and of equal quality to his earlier films.
And Mountains May Depart (2015) was a distinctive but finely made Chinese drama.
Praise for Casey Affleck in Manchester by the Sea (2016) and for Sallie Hawkins in Maudie (2016).
The year was improved by quite few classics re-exhibited and/or in Festival programmes. However, some of these were transferred to digital formats and that is a lottery for viewers. So I seek out those on 35mm prints.
Odd Obsession / Kagi (Japan, 1959] was a discovery, a sardonic family drama from Ichikawa Kon.
Humanity and Paper Balloons / Ninjô kami fûsen, directed by Yamanaka Sadao in 1937, was a film I knew of but only now had the opportunity of seeing: it has one of the great endings in world cinema.
West Indies (1979) is Med Hondo's exhilarating take on slavery, the African Diaspora and European racism.
And one film that transferred to digital with such care and attention that it retained its cinematic qualities was The Bride of Glomdal / Glomdalsbruden, directed in 1926 by Carl Theodor Dreyer.
I was fortunate to see Sergei Eisenstein's Alexander Nevsky / Aleksandr Nevskiy (USSR, 1938) in a nitrate print which gave a luminous edge to the famous 'battle on the ice' sequence'.
At the opposite end of the scale there were a number of filmic duds but the title that seemed the most interminable was The Killing of a Sacred Deer, directed by Yorgos Lanthimos. Interesting directors from national cinemas tend to lose that interest when they move into English-language International co-productions.
The wooden spoon goes to The Lost City of Z (2016). It was a rare 4K DCP distribution but the files that I saw included digital break-up and colour distortion. Friends had the same problem with different exhibitors. But the distributor Studio-Canal, declined an explanation for this.
But equally reprehensible is whoever controls the policy at the BFI of access to archive prints. I saw both Battleship Potemkin / Bronenosets Potemkin (USSR 1925) and The End of St. Petersburg / Konets Sankt-Peterburga (USSR 1927) in 35mm prints with excellent musical accompaniments, but the prints were copies of sound transfers rather than the proper silent prints with the correct frame rate and framing. Lenin's adage about cinema clearly falls on death ears despite the Centenary of 'The Great October Revolution'.
'Waiting to see …'
Written by keith1942 1 Comment Posted in Anniversaries, Festivals and Conferences, Film exhibition Tagged with 35mm
Favourites from 2016
The outstanding film – Our Little Sister
This was not the greatest year for new releases but there were some fine and powerful dramas and documentaries. One positive aspect was that nearly half the films that I saw at a cinema were on 35mm. Less positive was for D-Cinema; only 4 or 5 DCPs were in 4K; this despite distributors bragging on a many occasions that the source was a '4K restoration'.
Our Little Sister / Umimachi Diary (Japan 2015).
This was a sheer delight: one of the best films of the decade.
Dheepan (France 2015).
A fine and socially conscious drama, combining realism and imagination.
Son of Saul / Saul fia (Hungary 2015).
Rarely have I experienced such intense drama: a European Holocaust film with real substance.
Taxi / Taxi Teheran (Iran 2015).
Simple, actual, funny and fascinating.
Victoria (Germany 2015).
Impressive use of digital technology and the style completely fitted the drama.
Documentary:
The Pearl Button / El botón de náca (Chile, France, Spain, Switzerland 2015).
Visually superb and politically sharp.
I enjoyed Amy Adams in the fine science fiction film Arrival (Canada, USA 2016). And Nellie's cross-gender performance as Marvin in Paterson (USA 2016) certainly deserved the Palm Dog: unfortunately posthumously.
A fine restoration in 35mm:
Kean / Edmund Kean, Prince Among Lover / Kean ou Désordre et Génie, France 1924
Restored by the Cinémathèque française with tinting restored by Náradni filmavŷ archiv.
An impressive preservation of a film print:
By the Gosfilmofond of a nitrate print of Ramona (USA 1927) and screened at the George Eastman Nitrate Weekend.
Two great discoveries of the Year:
A Japanese Tragedy / Nihon no higeki (1953)
At the Sheffield Showrooms, a rare Japanese film drama.
Laughter in Hell, USA 1933.
Effectively a pre-code movie and the most intense and brutal chain-gang film that I have seen.
Special commendations:
For the Parkway Cinema in Barnsley for screening The Hateful Eight (USA 2015) from a 70mm print in the full 2.76:1 ratio.
The Cinémathèque française deserve a further commendation: a friend told me that they declined to licence a theatrical screening of a title sourcing digital video.
The worst film:
London Has Fallen (UK, USA, Bulgaria 2016).
In my defence there was a dearth of interesting titles that week.
Written by keith1942 Leave a comment Posted in Anniversaries, Festivals and Conferences, Film exhibition
My favourites from 2014
I thought the year was less productive and interesting than 2013: however I had a lay-off of nearly two months and missed a number of new releases. The ones that really impressed me this year were:
Winter Sleep / Kis uykusa Turkey / France / Germany, 2014.
For me not just the best new film this year, but the best for several years. Nuri Bilge Ceylan and his team have produced a long, but richly complex film. One that reflects on the personal and the social. Despite comments by some critics this is a splendidly cinematic film.
Ida, Poland, Denmark / France / UK, 2013.
An absolute pleasure in black and white academy ratio. Director Pawel Pawlikowski and cinematographers Lukasz Zai and Ryszard Lenczewski have produced a visually stunning film. The cast are excellent. What also impressed me is that the film not only achieves the look 1960s Poland but also of the Polish cinema of the period.
The Patience Stone, France / Germany / UK / Afghanistan, 2012.
This film had one of the outstanding performances of the year from Golshifteh Farahani. The screenplay, from the director Ayiq Rahini's own novel, by Jean-Claude Carriére suggests he is still the finest writer in European cinema.
Golshifteh Farahani in The Patience Stone
Concerning Violence, Sweden / Denmark / Finland / US / Norway / Germany.
This was an outstanding documentary, which showed proper respect for the archive material that it used: something that many films do not. The structure and editing of the film by Göran Hugo Olsson and his team was exemplary. The treatment of the writings of Frantz Fanon was somewhat partial, the most serious failing in the film.
The Missing Picture, France / Kingdom of Cambodia, 2013.
This was another exceptional documentary though its politics were less fully developed than in Concerning Violence. Rithy Panh's direction and design was powerfully evocative: and the use of models and dioramas gave the film a very distinctive form.
Set Fire to the Stars, UK.
A last minute addition: 2013 ended with a film about a sculptor, 2014 with one about a poet. Beautiful wide-screen black and white cinematography and a fine sound design and music score, (director Andy Godard, Cinematography Chris Seager, Music Gruff Rhys). It also rescues the poetry of Dylan Thomas from its rather facile treatment in Interstellar.
The 20th (and possibly the last) Bradford International Film Festival gave me the discovery of the year – a retrospective of the films of Japanese director Nomura Yoshitarō based on the writings of Kobayashi Mosahiro. I especially liked the 1958 Stakeout (Harikomi) with my favourite Takamine Hideko in a leading role.
Takemine Hideko in Stakeout
The Festival also provided a welcome retrospective of British director Sally Potter.
The 28th Leeds International Film Festival provided the best UK retrospective of the year – five films by the Swedish director Ingmar Bergman in 35mm prints. Included were his masterpiece Persona (1966) and the equally fine Through a Glass Darkly / Såsom I en spegel, 1961.
The Festival also provided the most challenging screening of the year – an immaculate print from the Netherlands Film Museum of Max Ophuls' 1936 The Trouble With Money. Unfortunately the print had no English subtitles: it says something for Ophuls skill as a director that I could follow most of the plot.
Il Cinema Ritrovato 28th edition offered a film that I have waited long to see in its full format. As part of The Golden 50s: India's Endangered Classics the Festival screened, in a black and white 35mm CinemaScope print, Kaagaz Ke Phool / Paper Flowers, 1959. One of Guru Dutt's memorable melodramas with very fine cinematography by V. K. Murthy and music by S. ED. Burman.
The Festival also screened the best digital restoration and screening I saw this year, a 4K version of John Ford's classic My Darling Clementine, 1946. The ample Arlecchino cinema was packed for the occasion.
The best offering from the silent era was at [predictably] the 33rd Le Giornate del Cinema Muto – The Silent Comedies of Yakov Protazanov unfortunately listed as Russian Laughter rather than the correct Soviet Laughter. I especially enjoyed The Trial Concerning Three Million / Protsess o Trekh Millionakh, 1926.
The nadir of 2014 was February, which saw the release of The Wolf of Wall Street, US. I can understand it being the most plagiarised film of the year but found it unaccountable that it was in the Sight & Sound 'top listings'. There have been recurring traces of misogyny in the films of Martin Scorsese and this seems to me to be the worse example.
Then it was joined by The Book Thief, US / UK, 2013. Markus Zusak's novel is an exhilarating and formally audacious piece of writing. The film version reduced it to the worse sort of mainstream conventions.
Finally, notable centenaries. The Hyde Park Picture House passed one hundred years – November 1914. The team still manages a pretty varied programme of films and also we enjoy fairly frequent 35mm screenings.
And then this was the anniversary year of Charlie Chaplin, first appearing in February 1914. I saw a considerable number of Chaplin films during the year, the one I most enjoyed revisiting was Modern Times, 1936. The screening at the National Media Museum was enhanced by a clip from the delightful Cuban film For the First Time / Por primera vez, 1967.
Written by keith1942 1 Comment Posted in Anniversaries, Festivals and Conferences, Film exhibition Tagged with Bradford International Film Festival, Hyde Park Picture House, Il Cinema Ritrovato, Le Giornate del Cinema Muto, Leeds International Film Festival
Cottage Road Cinema 1912 – 2012
Cottage Road Cinema – exterior
The Cottage Road Cinema opened on 29th July 1912. It is situated in the Leeds suburb of Headingley and when it opened there were about twenty-two film theatres in the city. By the height of the sound era the city had sixty-eight cinemas. Now the Cottage remains one of only two traditional cinemas in Leeds. Its 100th birthday was celebrated on the last Sunday in July with the erection of a 'Blue Plaque' and a special 'classic' screening. The event was assisted and supported by the Far Headingley Village Society who also produced an illustrated history of the cinema by Eveleigh Bradford. The event was opened by the current proprietor Charles Morris, who owns and runs a chain of six independent cinemas in Yorkshire and Cumbria, Northern Morris Associated Cinemas. It is a sort of antique cinema 'Roadshow': The Plaza, Skipton and The Rex, Elland both also opened in 1912, [though only the Cottage and the Plaza have been exhibiting continuously]. And then the Picture House in Keighley has its own anniversary during 1913. The celebration also included short speeches from the staff and the Society, ending with a celebratory poem for the Centenary.
The actual screening commenced with a selection of Cinema advertisements from the 1950s and 1960s – including familiar names like Omo and Persil, but with a variety of other firms, including local businesses and holiday resorts. There were also Ministry of Information shorts from the 1940s, featuring the Crazy Gang and Charlie Chester. And some more recent adverts parodying film s like High Noon and Zulu. The patina of time gave these shorts clips an attraction and humour that contemporary clips lack.
The main feature was the 1967 black and white comedy The Smallest Show on Earth. The film was produced by Michael Relph and Basil Dearden. Early in their careers both had worked at the famous Ealing Studio, and the touch of that Production Company was replicated, with the small independent Bijou Kinema taking on the large and posh Grand Cinema. The two stars Bill Travers [Matt] and Virginia McKenna [Jean] played a middle class couple who inherits the Bijou from eccentric Uncle Spencer.
The film really takes off in the second reel when they [and we] see The Bijou and meet the Kinema staff – projectionist Quill played by Peter Sellars, the cashier Mrs Thazackalee played by Margaret Rutherford, and doorman/janitor Old Tom played by Bernard Miles. These three character actors are in their element and wring much humour from the state of the building, the equipment and the archaic management. When Matt queries complimentary tickets in exchange for a donation of a chicken, Mrs Thazackalee responds 'well you can hardly send a third of a chicken to the Chancellor of the Exchequer." [A reference to the then contemporary Entertainment Tax].
The Bijou Kinema – interior
The Kinema itself is a beautiful piece of design and construction: with a baroque interior, dust and cobwebs everywhere, delightfully old-fashioned projectors and the exterior topped by a constantly askew sign. For the filming a façade was erected in Kilburn alongside an actual Railway Bridge. The interiors mixed studio sets with an actual contemporary cinema. And the rival Grand used the exterior of a Gaumont Theatre, then one of the major film circuits. All this was the work of Art Director Alan Harris and his team and the film was photographed by Douglas Slocombe.
The eccentric ways of the staff are beautifully counterpoint by the cinema audiences who suffer the travails of the screenings. They are realistic enough to be believable as a mainly working class audience in the late 1950s: but just enough over-the-top to be delightfully funny. The best sequences are when Matt and Jean attempts to improve the finances by 'encouraging' refreshment sales'. The screenings within the film appear to be from some actual B movies, westerns, but there is also a desert adventure which looks like it was specially shot for this feature. I thought I remembered an arctic adventure scene, but that did not appear in this print. The finest sequence is a private screenings by the staff of Cecil Hepworth's Coming thru' the Rye (1923) with Mrs Thazackalee accompanying on the piano. A lovely touch of nostalgia. Another fine moment is the end of a screening when the audience rushes for the exits in order to escape the National Anthem: only a lonely Quill stands to attention.
Inevitably the Grand stoop to skullduggery, but we know that the small guys' will surely win through.
Sunday's screening had an intermission halfway through the film, a traditional device in cinemas to bump up sales of soft drinks and ice creams. However, given the plot line of the feature this seemed quite appropriate. The screening of a worn but fairly good 35mm print was fine.
A great evening. The whole event was enjoyed by an almost capacity house (it seats 468), who applauded the introduction, applauded the advertisements, and finally applauded the feature. Hopefully the Cottage Road Cinema will survive to add to its long career.
There is more on the Cottage Road Cinema WebPages including a download for the illustrated history: other events are promised to follow:see http://www.cottageroad.co.uk/centenary.php
Written by keith1942 Leave a comment Posted in Anniversaries, British Cinema, Exhibitors | {
"redpajama_set_name": "RedPajamaCommonCrawl"
} |
With a stay at 121 Paris Hotel, you'll be centrally located in Paris, a 5-minute drive from Place de Clichy and 8 minutes from Moulin Rouge. This hotel is 1.5 mi (2.5 km) from Opéra Garnier and 1.6 mi (2.6 km) from Galeries Lafayette.
Make yourself at home in one of the 31 air-conditioned rooms featuring refrigerators. Complimentary wireless Internet access keeps you connected, and satellite programming is available for your entertainment. Private bathrooms have deep soaking bathtubs and hair dryers. Conveniences include safes and desks, and housekeeping is provided daily. | {
"redpajama_set_name": "RedPajamaC4"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.